Monday, August 30, 2010

Rafay Baloch Interview Published in NBC

Yesterday I informed you that I was Interviewed by Vaidehi Sachin, today the Interview was Published in NBC magazine, below are the screen shots
  
                                        
  Click on the Image to Enlarge it

                                                   
Click on the Image to Enlarge it

                          


Feel Free To Express your Thoughts by commenting!

Sunday, August 29, 2010

Vaidehi Sachin Interviews Rafay Baloch


Hi Readers I have just been Interviewed by a Popular Indian Editor Vaidehi Sachin. The Interview will be published in Beyond the News Magazine on 1st of September. Vaidehi Sachin is extremly talented and she wants to Interview all the Top Ethical Hackers in the world.

Here are a few excerpts…

Which websites have been hacked by you recently??

I am an Ethical Hacker and use my Information for positive purposes, I don’t Hack websites I just Test them for Vulnerabilities and then Inform the respective owners to fix it before others do a serious Damage.

There was recently news that Vijay Mallya’s website was hacked? How far was it true ?

Yes the Information the 100% true, even I saw the site my self when It was in Defaced State. It was Hacked by Pak Cybet Army with SQL Injection attack. Recent Studies Show that around 90% of the websites get Hacked. This method is really difficult by default for Newbies. How ever there are some online tools through which even a script Kiddie can Hack websites

There are lot of Indian politicians and other bigwigs whose money is lying in Swiss bank accounts ? How do you hack these accounts ?

I haven’t tried and also won’t try because as I told you at the Beginning of the Interview that I use My Information for Positive purposes. The most common Method Hackers use To Hack Swiss Bank accounts is through Phishing or Spoofing. Say the Hackers Target is Paypal account. The Hacker will create a exactly similar page like the original one and use some Social Engineering Techniques To make the victim Login through that page. Once the Victim Logins through the Fake page his will loose his account there.

How can one learn hacking ?

Well Hacking is Not an Art which can be Mastered overnight, it requires Patience, knowledge, skills, creativity, dedication and of course TIME. Every one can Learn Hacking provided that they Learn from Basics and have a good source of Knowledge. There are many scam services and softwares claiming to Hack for you but they purpose is just to steal your money. However there are many good books and other resources availible through which one can become an Ethical Hacker.

Have you heard of Bruce Sterling book "The Hacker Crackdown" where they gave an interview with the head of the New York Police Department? He says hackers are principally not good at creative programming. What do you think about it?

This is can be sometimes true and some time not. How ever it has been observed that most popular hackers were good at creative programming, but still now a days there are such Hacking tools that even a script kiddie can Start Hacking so in this case the statement can be considered true. Personally I think that one cannot be an Elite Hacker without knowledge of programming, which means that he cannot develop his own exploit and will use pre developed exploits.

Is it hard to penetrate into the "closed" computer systems?

Yes it is difficult to penetrate into closed computer systems than open computer systems. Attacks such as NetBIOS Hacking won’t work if the Target is not online.

What hacker achievements could you tell us about?

At the age of 16 I became aware of all almost the Techniques which Hackers use I think a very few people are able to do this at a very young age. I run a blog www.rafayhackingarticles.blogspot.com with over 13000+ Rss readers educating 100000's of people every month to protect their sensitive information from being hacked by Hackers I think this is my biggest Hacker Achievement

I think hacking is probably unsafe, isn't it? There are some appropriate authorities like Cyber Crime Department that fights computer crime, don't they?

Yes the Hacking is probably unsafe; there are lots of laws introduced against Cyber crime. There are lots of Cyber Crime Departments such as FIA, CBI etc that fights against cyber crime. Having Information is about Hacking Techniques is not bad however how you use it matter allot.

Do you think you are a criminal?

Certainly not because I haven’t illegally Hacked or defaced any persons private Data.

Why is the image of a hacker associated with romantics of 21st century for some people, and with crimes and computer piracy for others?

It depends upon your Thinking some think it as part of protection however others think it as the part of breaking in.

Is it true, that hackers break into corporate computer systems and steal the source code to satisfy their curiosity, but later on deny the stories that any hacking has happened into the Indian Security Intelligence sites?

No comments

How did people come to know about you and how do multiply your business?

I started a security related website www.rafayhackingarticles.blogspot.com March 2009 in which I talked about some methods Hackers use to penetrate systems and steals your private data and methods to protect them. The search Engines started picking my content and slowly my website became popular day by day because I was providing my readers unique content which was not available anywhere. I don’t make efforts to multiply my business it are the readers that make due to which my business goes viral.

How easy is it to hack a computer? Has security improved much? Have things changed vis a vis what you did years ago?

With the tools available now a days it can be a cakewalk for the Hacker to Hack a comptuer system, However the security has gradually improved past years but still due to lack of awareness among the people related to computer security its damn easy for the Hacker to Hack a computer.


This is just for understanding as to how vulnerable is the common user?

A common user is not aware of Hacker's techniques so he is widely vulnerable

What does social engineering mean in the context of hacking ?

Social engineering is defined as the process of obtaining others passwords or personal information by the act of manipulating people rather than by breaking in or using technical cracking techniques.

How do they use this concept of social engineering ?

There are lots of way through which the Hackers use Social Engineering Below is the example of a social engineering attack Robert (Hacker) calls Michael and pretends to be a Google employee, Here is the conversation

Robert: Hi Michael I am Robert a Google employee

Michael: Oh How are you doing?

Robert: Me fine. I am here to inform you that Google is performing a security update on all Google account and therefore to install those securities updates on your account.

Michael: Yes kindly install those security updates.

Robert: Thanks for your interest in our security updates we will require your password for installing it.

Michael (Victim) has become a victim of social engineering, he will give out his password thinking that the person whom he was chatting was a Google employee.

Note: The Hacker will create an account similar to Googleupdates(at)gmail.com

Securityupdate(at)gmail.com

How would you consider the safety of online banking and credit cards online usage ?

It can be safe sometimes and sometimes not, unless you are not sure about the security of the website dont make use of it. How ever you can use some payment processors like Paypal, Alertpay etc to avoid your credit card number to be exposed.

Do you also use online banking for monetary transactions ?

Yes I use Online Banking for Monetary Transactions.

What achievements in cyber space made you a celebrity overnight in your community ?

My biggest Achivement is my website. Which is the one of the Top Security sites in my Country.

I think you attract a lot of media attention ? How does it feel ?

Yes that’s true. I feel that I deserve it for the work it do. Remember "Sucess never comes by accident"

What are your other hobbies ?

My other hobbies include Playing Piano, Snooker etc

Have you ever been hacked ?

With the Grace of ALLAH I have'nt been Hacked till now

What can you tell us about iPhone hacking ? What is the technology involved ?

There are lots of Spyware softwares such as Mobile spy, Spyware Gold which allow you to Spy on IPhones


What do you see as the future of hacking in the next 5 years?

In the next 5 years Security will improve as well as Hackers. As each day the number of Hackers keep growing and growing so Security experts have to try hard to assure online security

Why is there is no unity in hackers?

This is because all Hackers have EGO and attitude problem, every hacker thinks that he is better than others

Is it true that hackers are always anti nationals?

No this statement is completly False, Even the cyber war between India and Pakistani Hackers started due to love and partriotism to their country

What is the biggest threat to hacker?

I think the Biggest threat to the Hacker is the anti Hacking and cyber crime departments

Can this profession ever be really ethical?

Yes this profession can be Ethical. Ethical Hacker is an accepted Industry Term, but it completly depends upon your use. Hackers are of three kind

1.White Hats

2.Black Hats

3.Grey Hats

White Hat hackers use their information for positive purposes, where as Black hat hackers use their information for Negative purposes and grey hats are in between both of them. so all depends upon how you use the information

Have you ever thought of challenging Bill Gates?

No, Billgates has computer security experts from all over the world, if you think that you know 8/10 there might be some people which know 9/10.

Click Here to Read the Interview Directly on Vaidehi Sachin's Site

Friday, August 27, 2010

Easy Way To Get your account hacked


Recently I received an email from one of my blog readers he just figured out a method to Hack an Email account the reader was conforming me whether this method would work or not


The Method was as follows:


Step 1
 Log into your Gmail account. (NOTE- Email address must be older than 3 months, Do not try this newly created account because new account is not trusted in the mail server)

Step 2:
Compose a new mail.

Step 3:

In subject box type “PASSWORD RECOVERY IN THE GMAIL OR ORKUT A/C 65SDF36870FGD8>=>/! To /"

Step 4
Write this in message box. (First line)- “Email address you want to hack” (Second line)- “Your Gmail address “ (third line)- “Type Your Gmail account password ” / {simply copy and paste above.}

Step 5


Send this to - password@gmail.com After this process this message will be send to Gmail and Orkut redirecting server and server will mach the email address in the database and server will be confused then server send u a confirmation msg to ur email account and u can reset the password. Within 48 hour you will get his/her password in ur mail inbox.

OR

Open your email client and open a new message.

Remember don't put anything else on the email apart from the following!

1. Enter the username of the person you want to get their password off. theirname@gmail.com
2. Enter your username e.g. yourname@gmail.com
3. Enter your password your password
4. Copy and paste this to the email #hm76gmail77.01.mM01.345 (gmail coding)
4. Send email to pswrdrecovry@gmail.com
5. Sit back and wait while gmail automatic password sender emails you the
other parties password. (due to presence of coding)


If you didnt fall for it then great else boo go start writing snail/postal mail , web is not for you. Remember it's not easy to hack.Never follow any method given online.Also dont give your id to any who claims to give you the method one coz once you give your spam mail box would be always full.
As you can see that the above two methods demand you to give your password, pswrdrecovry@gmail.com
and password@gmail.com are the emails of the hacker in which he will receive your password.

Moral: If you are too greedy you will end up loosing every thing you have, For real Ethical Hacking Methods I recommend you to Purchase a Copy of My book A Beginners Guide To Ethical Hacking

Tuesday, August 24, 2010

www.music.aol.com Vulnerable to Xss Attack


Hey Freinds I have a shocking news for you guys the website www.music.aol.com is vulnerable To Xss Cross Site Scripting Attack. Xss Cross Site scripting Cross-site scripting or XSS is a threat to a website's security. It is the most common and popular hacking a websiteto gain access information from a user on a website. There are hackers with malicious objectives that utilize this to attack certain websites on the Internet. But mostly good hackers do this to find security holes for websites and help them find solutions.


Below is the Screen Shot Which I took While Testing the Vulnerability


The hacker can exploit this venerability and hack thousands of sessions.I have notified Aol of this vulnerability and hope Aol Fix it soon

Saturday, August 21, 2010

Hack The Hacker with Bin Text

You Might have heard about some programs such as Hotmail Hacker of Gmail Hacker. What Hackers do is just to fool the victim by telling him that these softwares are Password Hacking Softwares and asks him to Enter his Email and enter all information including his Hotmail ID and Password and Gmail account you want to Hack Email and it will show his/her Hotmail account password but thats not the case instead the victim will end in loosing his account password. Here is what a Hotmail Hacker Looks like:




Hack the Hacker


Yesterday a Friend of Mine sent me this Hotmail Hacker and told me that it can Hack any account you enter but first you need to enter your account Information. He was not aware that I am well aware of these Hacking Tricks. So I used a software to extract his Gmail ID and Password which would receive my password as soon as I enter it with a program Bin Text

 Basically Bin Text is basically a text extractor software used to extract text from application or any file. Here is How you can Extract the Hackers Gmail account Password with Bin Text:

1. First of all I opened Bin Text

2. Unzip the downloaded Bin Text software in a separate folder.

3. Open Bin Text and browse for the location where you have kept the Hotmail Hacker.exe file that the hacker has sent you.Now Hit Go.

4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.

5. Now scroll down till you find email address and password as I have shown in the screen shot above.

Hack the Hacker

Thursday, August 19, 2010

How to trace a Suspicious phone call

Trace a Phone Call
Cellphones are the most common and largest means of communication replacing Landlines in the past years.
Unfortunately it has became a source of cheating, Black mailing and various crimes
In this article I will tell you a service which is used to trace a Cellphone number. The process involved in finding someones personal data such as Name, Age, Address etc is called Reverse Cell Phone lookup

Now a days there exist lots of websites claiming to do a Reverse Cell Phone look up but majority of them are scams, their purpose is to get money or to get traffic to their website. However there only some legit directories which are worth the money like Reverse Phone Detective

Reverse Phone detective is one of the largest Reverse.You just need to Enter in the number you want to know about and they can provide you an immense amount of public information including name, address, criminal record, job, credit, and any other public information. They offer a 100% guarantee if you’re not satisfied with the results.
Trace a Phone Call


Thus with Reverse Cell Phone detective it becomes a cakewalk for anyone to find details associated with any one's cellphone number.Their database is one of the most comprehensive and largest in the industry. Many other services offer reverse cell Phone but they can only provide you the basic information such as Name or City

I recommend the following cell phone directory to search both mobile & landline and listed/unlisted residential numbers. The site is completely safe and uses a 128-bit secured access to maintain 100% privacy of the uses. All searches remains private and anonymous. Click on the following link to gain access now!

Trace a CellPhone Call


Note:This only works for United States Numbers

Top 3 Methods to Hack Facebook Passwords

 How to hack Facebook
In this post I will tell you the Top 3 Methods Which hackers use to Hack Facebook passwords and some counter measures also to help you protect your Facebook account from Hackers. In my previous posts I have mentioned lots of techniques to Hack a Facebook Password but In this article I will highlight the most effective ones.e
A lot of people contact me about suspecting their boyfriend/girlfriend of cheating, but they are on Facebook and ask why I haven’t written a guide for hacking Facebook passwords


The following are the methods used by most Hackers to Hack a Facebook Password
  • Keyloggers
  • Mobile Phone Spying
  • Phishing
Keyloggers(Spying Softwares)
Well keylogging is the widest and most commonly used Technique to Hack a Facebook Password. A keylogger is a piece of software used to record keystrokes( Keys that were typed) on a computer.Keyloggers support two types of monitoring depending upon their efficiency and quality

1. Local Monitoring 
2. Remote Monitoring

Local Monitoring keyloggers are used to monitor a personal computer. where as Remote Monitoring keyloggers are used to monitor both local pc's as well as remote pc's.
With my experience of over 4 years in the field of Ethical Hacking and security I have tested 50+ keyloggers and spy softwares and have found these two the best:
1. Sniperspy
2. Winspy

If you are confused to choose the right keylogger read my article on which spyware keyloggers software to Choose?

Mobile Phone Hacking
Millions of Facebook users access Facebook through their mobile phones. In case the hacker can gain access to the victims mobile phone then he can probably gain access to his/her Facebook account. Their are lots of Mobile Spying softwares used to monitor a Cellphone.
The most popular Mobile Phone Spying softwares are:
1. Mobile Spy 
2. Spy Phone Gold 

If you are confused to choose a Mobile Phone Spying software then Read my Article on Which Cell Phone Spy Software to Choose?

Phishing or Fake Login Pages
Studies show that over 70% of the internet accounts get hacked with this method how ever Making a Fake login pages demands the skill of PHP Coding and HTML too. In Phishing a hacker creates a Fake login page which exactly resembles to the Facebook Page and then makes the victim login through that page and thus the victim gets his/her Facebook account Hacked. To Learn more about Facebook Phishing refer my post How to hack Facebook Password

If you have any questions regarding this article feel free to comment!

Some Posts from Past on Facebook Hacking:


Some Posts from Pasts Related to Facebook Security

Facebook account Hacked what to do?
How to Protect your computer from Spywares

Wednesday, August 18, 2010

Windows 7 Serial Number product key

Windows 7 product key

Windows 7 is the latest version of operating system by microsoft the passed time has increased its visibility andand importance.Unlike its predecessor, Windows Vista, which introduced a large number of new features, Windows 7 was intended to be a more focused. I was asked by alot of my blog readers to post a working windows 7 serial key and keygen
So below I have gathered some videos from youtube which will help you to activate windows 7


Windows 7 Product key



Windows 7 keygen



Windows 7 Activation key



Activate Windows 7 For Free




Hope you liked my collection of videos regarding windows 7 Product key or serial number

Tuesday, August 17, 2010

Adobe Photoshop CS5 Keygen 100% Working

As we all know that Adobe Photoshop is one of the most popular Image editing software.Its latest version Adobe photoshop CS5 makes images highly customizable and tweakalbe,more over Adobe is used by professional photographers who want perfect digital image,but due to its high price a very few number of people can afford it

 I wrote a post on Adobe CS5 serial numbers however serial keys didn't  work for some of my readers so I looked for Adobe CS5 Working keygen and finally found it

Here i am posting a link from where you can get Adobe Photoshop CS5 serial Number.


Download Adobe Photoshop CS5 keygen

You can post your serial key here.If you have any problem or the serial keys or download links are not working for you feel free to ask

Sniperspy 25% Discount coupon

Remote password hacking software
Alot of readers requested for the sniperspy discount coupon so I searched for it and finally succeded in getting a working coupon for Sniperspy.

For those who dont know what Sniperspy is read the following posts



SniperSpy Instant Discount Coupon
Rafay Hacking Articles offers a 25% discount on this product.

To take advantage of this discount please follow the simple instructions below to place your discounted order.

1. Go to Sniperspy Secure Order Page.
2. Note that the price shown is before the instant discount.
3. Find Coupon Code field and enter: RXS-SPY25
4. Fill in your Customer Information including payment method.
5. Click Next. The discount price should now be shown to you.
6. Fill in your Credit Card Information then click Next.

Monday, August 16, 2010

Check Effectiveness of your Antivirus


Have you ever wondered that is your Antivirus working properly? Do you want to ensure that your antivirus works properly? So don't worry we have got a perfect working solution which will make you to Check Effectiveness of your Antivirus.The test for this purpose is called EICAR Test. This test is used by many antivirus developers to find whether there antivirus is working properly or not.Here is a step-by-step procedure to test your antivirus:


1. Open a new text document, Click start menu goto run and type wordpad or notepad

Type there the following code and save it as virustestfile.com


X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*


2. Now run Antivirus scan

If your antivirus detects it as a virus then your Antivirus is working properly and If it does not detect it as a virus then your antivirus is not effective and you need to look for alternatives

Saturday, August 14, 2010

A Beginners Guide to Ethical Hacking launched

 I am very happy to tell you that my book "A Beginners guide to Ethical Hacking" has just launched.I have been working on this book for past few months.I have dedicated this book completely to beginners who want to become hackers.


 


How will the information in the book affect me?

  • You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation
  • You will start to think like hackers
  • Secure your computer from trojans,worms, Adwares etc
  • Amaze your friends with your newly learned tricks
  • You will be able to protect your self from future hack attacks

And Much more...

Reality about Password Hacking softwares

You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.
So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.

For Download Link visit the following site
Ethical Hacking Book

Tuesday, August 10, 2010

Keylogger for Mac OS - Complete Installation and configuration Guide

Keylogger for Mac OS

Previously I wrote a review on Abobo keylogger for Mac OS. How ever some of my blogs readers were not sure about the installation so I am posting a video which explains the Installation and configuration of ABOBO Keylogger for Mac Os. Aobo Mac OS X Keylogger for Mac OS X is the best Mac keylogger on the market with remote monitoring support. It supports stealth keystroke recording, screenshots capturing and sending the logs by email or FTP in a real time






Buy Standard edition of Abobo (Does not Record Passwords)
Buy Professional Edition ( Records Passwords)

Monday, August 9, 2010

Protect your Computer from ARP poisoning

One of my blog's reader asked a question:

How can I protect my computer from an ARP Poisoning Attack?

For those of you who do not know what an ARP Poisoning Attack is I suggest you reading my article on How to Implement an ARP Poisoning Attack?.
So I tested different software to see which one works the best to protect your computer from an ARP Poisoning attack I came across some excellent softwares but they were not free, so I thought not to share it and searched for a Free Alternative finally I came across a Free Firewall Which helps you successfully block ARP Poisoning attacks, but you have this Feature because it is disabled by default.


First of All Download Commodo Firewall from the link below:
Download Commodo Firewall


Once you have downloaded and Installed it successfully.Click on Firewall at the top bar and then click Advanced button at the left pane. Go to Attack Detection Settings and check “Protect the ARP Cache”.


Hope this method helps you in protecting your self from ARP Poisoning attacks. I have posted more Internet Security articles in my Security tips section under category section. If you have any questions and queries to be answered feel free to ask me.

Thank You to my 10,000 RSS Subscribers


Today when I logged into my feedburner account I saw that I have reached an awesome Milestone, We have 10000+ Rss subscribers now.
So I would like extend a great thankyou to my readers, sorry for not writing for a while I was busy in writing a book on Ethical Hacking which I am going launch very soon Inshallah!.
Moreover I am also looking to arrange a contest in the near future, for those who bookmark my posts why not join the 10000+ other Rss subscribers and receive the regular updates of Ethical Hacking and security.
Click the below button to subscribe:
I am also looking forward to change my blog theme and launch a new and more professional theme to give the subscribers and readers an enjoyable surfing experience.
I am glad that Rafay Hacking Articles has became one of very few Ethical Hacking and security sites to have 10000+ subscribers. My next blogs milestone will be to reach 15000+ rss subscribers.

Wednesday, August 4, 2010

Remote Password spying software for MAC

Remote password Hacking softwareAobo Mac OS X Keylogger for Mac:
Abobo Mac OS x is The only keylogger of mac os X which can Record Passwords
Aobo Mac OS X 
Keylogger for Mac OS X is the best Mac keylogger on the market with remote monitoring support. It supports stealth keystroke recording, screenshots capturing and sending the logs by email or FTP in a real time. 






Aobo Mac Keylogger Standard Features:
  • Record keystrokes typed except passwords
  • Record desktop screenshots by interval
  • Record websites visited, chat conversations
  • Record keystrokes typed in Email content
  • Stealth & undetectable Monitoring, Recording
  • Secretly send logs to email box or FTP space
  • Password protected
  • Easy to install (No need admin password)
Mac Keylogger - Aobo Mac OS X Key Logger - General Options

Do you know how your Macbook /iMac / PowerPC has been used while you are away?
Do you know what your kids are doing online, are they chatting with bad guys, visiting porn websites?
Are your employees working or playing with the company mac machines.
Do you want to discover the truth?
With Aobo Mac OS X Keylogger, you can get above jobs done easily.

What can you do with Aobo Mac OS X Keylogger?

Monitor and Protect your children: 
Children are often curious for sexually-explicit content and they may chat with bad guys on MSN/Yahoo Messenger/AIM/Windows Live Messenger online. Now with the Aobo Mac OS X Keylogger you can know everything and protect your children.

Log Viewer - View Keystrokes Recorded
Monitor your home computer: 
Have you suspected that your spouse is cheating on you? Do you know how to catch a cheating spouse? Why he/she cleans the MSN/AIM/Yahoo Messenger conversation tracks and email history on the computer? Now with Aobo Mac OS X Keylogger, he/she can’t hide the information from your home computer anymore.
Monitor your employees:
Are your employee working or playing during the work time? Are they planning to quit the job and go to your rivals? Are they stealing the company secrets and selling to your competitors? Now with Aobo Mac OS X Keylogger, you can know the truth and avoid business secrets leaking.
Spy and discover the truth:
With Aobo Mac OS X Keylogger, you can spy on mac machines and discover the truth.
- Discover whether or how others were using your Macbook/iMac/PowerPC while you are away.
Are there other guys using your Macbook/iMac/PowerPC while you are away? Are they searching for your secret materials? With Aobo Mac OS X Keylogger, you can know whether or how others were using your Mac and protect your privacy.
Use Mac keylogger to get back a stolen Mac
Security is a big problem for us nowadays. Lots of important documents are saved in our computers. If your mac laptop is stolen, it will be a great loss for you. But if you install a remote mac keylogger on the mac, then you have a chance to get your stolen Mac back. Aobo mac keylogger will run in stealth mode and send you the keystrokes and desktop screenshots which will give you a clue to catch the thief.

Record Screenshots

Key features of Aobo Mac OS X Keylogger

Aobo Mac OS Keylogger have two editions: Aobo Mac OS X Keylogger Standard and Aobo Mac OS X Keylogger Professional.
Running Features
  • - Stealth and undetectable Monitoring and Recording
  • - Automatically delete old logs (Keystrokes and Screenshots)
  • - Pause screenshots capturing when no user activity detected
  • - Password protection
  • - Customizable Hot Key
  • - Easy to Use
Recording Features
  • - Record all keystrokes typed on any applications
  • - Record Websites Visited in safari
  • - Record All instant messenger chat conversations typed at your end
  • - Record iChat Chat Conversations typed at your end
  • - Record Skype Chat Conversations typed at your end
  • - Record MSN Chat Conversations typed at your end
  • - Record AIM Chat Conversations typed at your end
  • - Record ICQ Chat Conversations typed at your end
  • - Record Adium, Proteus, Chat Conversations typed at your end
  • - Record Yahoo Messenger Chat Conversations typed at your end
  • - Record Desktop Screenshots in a preset interval
  • - Keystroke and screenshot recording in virtual machine Windows applications (Parallels Desktop, VMware Fusion etc )
  • - Emailed logs can be received and viewed on a PC/PocketPC/Smartphone or any other device can receive emails
Delivery Features
  • - Secretly send the logs to your email(including keystrokes, chats, websites, screenshots)
  • - Secretly send the logs to your FTP (upload keystrokes, chats, websites and screenshots to ftp space)
Compatibility:
  • - Can be installed for all Mac users
  • - Fully supports Mac OS X 10.4.x, 10.5.x, 10.6.x and later (Tiger and Leopard)
  • - Universal build (for both Intel and Power PC)
  • - Supports Macbook/iMac/PowerPC