Features

Icon

Undedectable for Anti-virus Software

The keyboard works transparent to computer operations. It is undetectable for any kind of security scanners.

Icon

No Software required

There are no drivers or software required. Those can be detected by Anti-virus programs. One time setup and it's ready forever.

Icon

Huge memory capacity

Up to 2 Gigabytes of internal memory are organized as an advanced flash FAT file system; secured with 128-bit memory encryption.

Icon

USB Connection

Connect the keyboard via USB cable or wirelss with an USB dongle. Different versions availible.

Icon

Windows and MAC compatible

Mac Compatibility Pack (MCP) option, enhancing performance on all Mac systems.

Icon

Wi-Fi Version availible

Background connection to the Internet over a local Access Point. Support for WEP, WPA, and WPA-2 encryption.

Icon

Email reporting

Automatic E-mail reports with recorded keyboard data. On-demand access at any time through TCP/IP.

Icon

Date and Time Stamp

Built-in date and time stamping module.


Keyboard versions

Cable Secure Keyboard v10

cable keyboard

   No installation required, plug in and ready
  Not detectable for Anti-virus software
  No software or drivers required
  Built-in memory, 128 Bit Encryption
  Windows, Linux, and Mac compatible
  Quick and easy national layout support
  USB Cable Connection







Recording mode

usb cable
Installation of the Secure Keyboard v10 in record mode is quick and easy. Simply plug it in the USB port and you are ready!

No software or drivers are required. The built-in keylogger will automatically start recording all data typed on the
keyboard to the internal flash disk.

The internal memory has a capacity of 8 Megabytes which saves about 1 year of key stroking.





Read-out mode

outread
Once the data has been captured in record mode, you can out-read it on that computer, or any other pc,
by pressing a special 3-key combination. This is done by switching to Flash Drive mode.

Each device has a built-in 3-key combination (by default it is K, B, S). Press these 3 magic keys
simultaneously to trigger the Flash Drive mode. The keylogger will automatically respond as a mass
storage device.




mass storage device
As soon as your operating system (windows, iOS) detects the mass storage device click on "Open folder to view files."

In the Flash Drive will be the file LOG.TXT with a text log protocol of all captured data. All Keystroke data is formated
in the same as it would appear on the screen. Special keys are displayed in brackets ([Ent], [Esc], [Del], etc.).

This file can be viewed and searched with any text editor, such as Notepad or Word.






log file
As you can see in the logfile, every single keystroke and word is displayed.
Also for false typing, the Delete Key will be shown in brackets.

To configure the keylogging device you will find a second file next to LOG.txt which
is called CONFIG.txt. Open that file and make changes like: Dis- and enable keylogging,
change 3-key-combination password and mamy more.

The setup and use is very easy. Just plugin and let your keyboard with a
built-in keylogger do the work automatically and save every single keystroke!

Wireless Secure Keyboard v12

wireless keyboard

   No installation required, plug in and ready
  Not detectable for Anti-virus software
  No software or drivers required
  Built-in memory, 128 Bit Encryption
  Windows, Linux, and Mac compatible
  Quick and easy national layout support
     
  Wireless USB Dongle







Recording mode

wireless-dongle
Installation of the Wireless Secure Keyboard v12 in record mode is quick and easy. Simply plug in the dongle in the USB port and you are ready!

No software or drivers are required. The built-in keylogger will automatically start recording all data typed on the
keyboard to the internal flash disk.

The internal memory has a capacity of 8 Megabytes which saves about 1 year of key stroking.







Read-out mode

outread
Once the data has been captured in record mode, you can out-read it on that computer, or any other pc,
by pressing a special 3-key combination. This is done by switching to Flash Drive mode.

Each device has a built-in 3-key combination (by default it is K, B, S). Press these 3 magic keys
simultaneously to trigger the Flash Drive mode. The keylogger will automatically respond as a mass
storage device.




mass storage device
As soon as your operating system (windows, iOS) detects the mass storage device click on "Open folder to view files.".

In the Flash Drive will be the file LOG.TXT with a text log protocol of all captured data. All Keystroke data is formated
in the same as it would appear on the screen. Special keys are displayed in brackets([Ent], [Esc], [Del], etc.).

This file can be viewed and searched with any text editor, such as Notepad or Word.






log file
As you can see in the logfile, every single keystroke and word is displayed.
Also for false typing, the Delete Key will be shown in brackets.

To configure the keylogging device you will find a second file next to LOG.txt which
is called CONFIG.txt. Open that file and make changes like: Dis- and enable keylogging,
change 3-key-combination password and mamy more.

The setup and use is very easy. Just plugin and let your keyboard with a
built-in keylogger do the work automatically and save every single keystroke!

Wireless Wi-Fi Secure Keyboard v20

wifi keyboard

   No installation required, plug in and ready
  Not detectable for Anti-virus software
  No software or drivers required
  Built-in memory, 128 Bit Encryption
  Windows, Linux, and Mac compatible
  Quick and easy national layout support
     
  Wireless USB Dongle with built-in Wi-Fi Module
  Internet Background Connection via Access Point (Router)
  Sends the recorded keyboard data to Email automatically
  Built-in date and time stamping module







Recording mode

wifi dongle
Installation of the Secure Keyboard v20 in record mode is almost as easy as the other versions. First you simply plug in the dongle in the USB port as well.

After that you just have to setup the Wi-Fi Information ,Wi-Fi Network Name (SSID), Password and Encryption Type (WPA, WP2 or WEP) for the Local Access Point and specify your email address where you want the recorded keystroke data to be send to. The adjustmens are just as simple as with any other Wi-Fi Device (Laptop, Smartphone, etc.).

No software or drivers are required. The built-in keylogger will automatically start recording all data typed on the
keyboard to the internal flash disk and in addition sends the data to your Email!

The internal memory has a capacity of 2 Gigabytes which saves about over 10 years of key stroking.





Read-out mode and Features

wifi email
The setup takes no more then 5 minutes and has to be made only one time. You can then receive the logged data to your Email address anywhere in the world or readout the data as an USB Flash Drive as well.

Once connected to an Access Point, the Wi-Fi Secure Keyboard v20 will start sending Email reports with captured keystroke data to any recipient E-mail address you set up.

This means you can keep track of what's happening on the monitored computer from any place throughout the world, just by checking your mailbox!




multi keyboard
The Secure Keyboard v20 also features a TCP/IP interface, for on-demand access at any time.
You can remotely download recorded data from the keyboard, using special software delivered with the device.

The control software can communicate with multiple Wi-Fi Secure Keyboards, allowing you to create entire networks.

This solution is particularly recommended for monitoring several computers in a household, or controlling employee productivity in companies






log stamp
As you can see in the logfile, every single keystroke and word is displayed.
Also for false typing, the Delete Key will be shown in brackets.

The Wireless Wi-Fi Secure Keyboard v20 supports time and date stamping. You can see the date and time shown in brackets in LOG File displayed before the keytroke data sentences.

The setup and use is very easy. Just plugin and setup Wi-Fi and Email and let your keyboard with a
built-in keylogger do the work automatically and save every single keystroke!


Quality characteristics

The finishing of the Secure Keyboards is handmade in Switzerland


spykey

Before we built-in a keylogger into a keyboard, we do an effortful quality testing for choosing the right keyboard model.

The keyboard should pass our quality demands. Please read the next slide for keyboard quality standards.

All keyboard are manually openend by hand from our mechanics team.





spykey

Here you can see the main controller of the keyboard. It is connected with the keys, power supply and wireless dongle/cable.

We carefully attach the keylogger module to the controller in a very precise handmade process.

The whole process of making the unit fully functional takes about 6-8 hours.The unit will not fail and will remain stable for years of use.





spykey

We double check that the module pins match the USB connector pins and the keyboard controller pins.

If the pins are connected wrong, the keyboard, KeyGrabber Module, and PC might get damaged!

So as a result we provide a handmade finsih Secure Keyboard very accurate in functionality and lasting for years of use!

We only use quality keyboards


spykey

Upgrading your keyboard may not seem like an important thing to do, but you would be surprised what a difference a well-made keyboard can make in terms of comfort, efficiency, and overall satisfaction.

We like to combine both:

A Wired or Wireless keyboard that feels very comfortable when typing a lot, great design and (just to be ready with a simple plug-in) a built-in keylogger.







spykey

The setup of all of our provided Spy Keybords is fast and easy,
just plug-in and start the keystroke recording immediately
.



Hardware vs. Software


hardware keylogger
   No access to the running system needed
  Undetectable for security scanners and anti-spyware
  Recording and out-read can be done on different computers
  Operating system independent (Windows, Mac OS, Linux)






spykey
   Requires full access to operating system to install
  Fully detectable for software scanners
  Out-reading and playback at the same computer only
  Works mostly with only one operating system
keylogger comparision

Pricing

Secure Keyboard v10

$249

Cable
  • Plug-in and ready
  • Undetectable
  • 16 MB Memory (+1 year capacity)
  • USB cable

Secure Keyboard v20

$349

Wireless Wi-Fi
  • Plug-in and ready
  • Undetectable
  • 2 GB Memory (+10 years capacity)
  • E-Mail Reporting, Time/Date Stamp

Contact Us

If you need some assistance or have any questions regarding the product,
You can contact us using the information on the right side.

Shipping companies we use:



We support the following payment options:

Buy Now

or go to 5 Best Spy Cams Review