Loading... Please wait...
Expert Assistance Call 1300 779 489 or SMS 0400 058850
  • Image 1
  • Image 2
  • Image 3

Keyboard Keylogger - USB Extension Cable - WiFi

$299.95
Shipping:
Calculated at checkout
Quantity:

Product Description

KeyBoard Keylogger - USB Extension Cable - WiFi

The "Keylogger Cable Pro"is an ultra-discrete USB keylogger embedded inside a USB extension cable which is extremely well disguised and easy access to the captured data from any Wi-Fi device such as a computer, laptop, tablet, or smartphone. From the outside, the USB cable doesn't differ from any ordinary USB cable and does not draw attention to it in any way, no flashing lights and no sounds.

Unlike traditional KeyLoggers, the Keylogger Cable Pro once installed you never have to access the cable to retrieve the captured data, access can be via any computer, tablet of smart phone connected to the internet which unleashes a broad set of options, such as email reporting, time-stamping, and live data streaming.

The Keylogger Cable Pro is a powerful surveillance and/or security tool, the web interface allows to configure the Access Point WLAN settings as well as a keystroke logging options and is compatible with over 40 national keyboard layouts including the most popular languages and keyboard layouts used throughout the world.

Features

  • Records keystrokes from any USB keyboard
  • Ultra-discrete keylogger, minimal risk of exposure
  • Stores 8000 pages of text
  • 16MB internal flash memory
  • 100% stealthy, undetectable for security software
  • Supports over 40 national keyboard layouts
  • Compatible with barcode readers
  • Works as a Wi-Fi hotspot, or as a Wi-Fi device
  • Sends Email reports with recorded keystroke data
  • Supports time-stamping
  • Connect from any computer, smartphone, or tablet
  • Access keystroke data from web browser, no software or app necessary
  • Retrieve data remotely without touching the device
  • Simple and clear WWW interface
  • Supports WEP, WPA, and WPA-2 network security
  • Memory protected by hardware encryption

 

-->

Back to Top

--> ?