We wrote a lot of articles on how to detect and remove spyware for our library, and therefore decided to classify this material.
The basis of classification is the subjective evaluation of the technical specialists of our test lab. We plan to continue to test the popular spyware and believe that this classification helps COVERT Pro users and visitors of our web site to better understand the place of every spyware among the present-day threats.
We give three scores to every spyware:
• First – design and functionality. The higher rating, the more opportunities the program provides for data theft and tracking.
• Second – stealth within the system. How difficult it can be found on your computer. The higher rating – the better the program hides itself.
• Third – evaluates protection from antispyware and complexity of its removal. The higher the score, the more diligently spyware fighting for its existence on the computer and the more you need to take steps towards its complete removal. Some programs can not be removed by a simple erasing from the disk.
JETLOGGER — RLM: 8 / 3 / 2
JETLOGGER allows you to monitor user activity on the computer, collect information about running programs, visited sites and key combinations, displays data in diagrams and graphs. You can enable the automatic creation of screenshots at certain intervals. Hides the fact of collecting information about activity on the device.
Yaware.TimeTracker – RLM: 4 / 0 / 1
TimeTracker is an automatic employee time and productivity tracking software. Testing Yaware.TimeTracker showed that it has the same functionality as a typical spyware – it takes screenshots and sends them to the developer’s server. You can install it not only on the corporate system, but also on any computer.
Award Keylogger – RLM: 5 / 2 / 3
Award Keylogger is a fairly popular spyware that is advertised on many websites as a powerful real-time tracking tool with rich functionality. However we could not see all the listed functionality, although we have tested the last full-featured version. This program has been slightly better than an average spyware.
Real Spy Monitor – RLM: 5 / 0 / 0
Real Spy Monitor is designed to monitor the activity of the user on the computer and it allows saving information about programs that are being launched, opened files and windows, it takes screenshots, monitors websites are visited by users, intercepts and saves keyboard input.
Keylogger LightLogger – RLM: 5 / 1 / 1
LightLogger has a fairly standard set of functions – it keeps track of all visited websites, takes screenshots with a specified frequency, intercepts keyboard input in applications, browsers and emails, remembers all running programs, copies the contents of the clipboard.
REFOG Personal Monitor – RLM: 7 / 1 / 0
REFOG Personal Monitor is a typical representative of the keyloggers family, which can also take screenshots, save the history of visited websites and used applications. In addition, this program is able to copy the texts of outgoing and incoming messages from all popular instant messengers. Keylogger sends by e-mail all collected information about user’s activity.
Hide Trace – RLM: 2 / 0 / 0
Hide Trace is a typical representative of screenshotters, which monitors user’s actions, creating a detailed report about open windows by making screenshots.
WebWatcher – RLM: 6 / 8 / 2
WebWatcher works very secretly. You can’t find it in the processes or in the services or among drivers. It is difficult to find it using standard tools.
Dame Ware Mini Remote Control Server – RLM: 6 / 0 / 2
DameWare Mini Remote Control Server enables to connect and control remote machines via Internet or local network. It can secretly, invisibly to you, control all your actions.
Kickidler — RLM: 7 / 2 / 2
The program has good functionality, but is easily detected and removed. It has a function of blocking entrance to COVERT Pro secure platform, which can be easily bypassed.
Total Spy – RLM: 3 / 1 / 0
Total Spy – the interface is extremely simple, the program is small and does not affect the performance of the system.The program has only basic keylogger functionality, it can be easily detected and removed.
PC Pandora – RLM: 7/ 8 / 5
PC Pandora belongs to the class of spyware running via DLL libraries. This program has no processes, services, drivers, and it’s not in the startup and standard locations where you can run the software. It uses DLL libraries, one of which loads with the operating system and through it connects the other. PC Pandora does not affect the performance of the computer, so you do not suspect anything.
Micro Keylogger – RLM: 5/ 7 / 4
Micro Keylogger(also called keystroke logger or keyboard logger) is an invisible keylogger for Windows 8/7/Vista/XP that runs hidden in the background to secretly record keystrokes typed, passwords entered, websites visited, applications/files used and take screenshots of the activities.
SniperSpy – RLM: 7/ 0 / 0
SniperSpy offers real-time monitoring, website blocking, keystroke logging and screenshots. It keeps logs for applications opened and their duration of use. It also keeps track of files if they move around on the hard drive.
System Surveillance Pro – RLM: 5 / 1 / 1
System Surveillance Pro monitors keystrokes, used programs, visited websites, IMs, and so on, saving all information to a log and sending results to a custom email address
KidLogger PRO – RLM: 3 / 0 / 0
KidLogger PRO,collects data about any user activity on the computer and creates detailed time tracking and productivity reports available online. This is open source program. After making changes in its code, this program will not be in anti-virus signature databases.
SoftActivity Keylogger – RLM: 6/5/3
SoftActivity can spy the applications that are used and the duration of the usage. It can record the keystrokes as well as visited web pages. Also the program can monitor the emails and IM conversations (Skype, Yahoo, AIM, ICQ, MSN). Screenshots can be taken of the whole desktop or from the active window at an interval specified by you. Moreover, Keylogger can be set to monitor the activities of the files that are accessed either from USB or hard drivers.
Audio Spyware Snooper – RLM: 4 / 1 / 0
Snooper constantly monitors sound for voice activity and starts recording once it detected loud sound, and automatically stops recording when voice disappeared. With this voice activated recording and completely undetectable software, you can record activity via mic any time.
The Best Keylogger – RLM 5/0/0
The Best KeyLogger offers the following features: keystroke, screenshots, files, printer, MSN conversation, Mail, process, system, mouseclick and copy-paste logging; it offers autostart with windows.
Spytech SpyAgent – RLM: 5 / 1 / 1
SpyAgent – all-seeing eye can bring an array of benefits with the ability to log all keystrokes, track web and program usage down to the second, and show you everything that has happened with screenshots.
Ardamax_Keylogger – RLM: 6 / 2 / 0
Ardamax Keylogger is a keystroke recorder that captures user’s activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
Spyrix Personal Monitor – RLM: 8 / 1 / 0
Spyrix Personal Monitor is a powerful software for full and detailed remote monitoring of user activity, including activity on social networks, IM chats and Web surfing.
Keylogger Remote – RLM: 3 / 1 / 0
Free Keylogger Remote is able to record all PC activities remotely! You can start spying remotely after 2 minutes of deployment. Every key typed on keyboard will be recorded into secure report. The titles and addressed of all visited websites will be captured as well. The software is able to capture screen every few minutes. When the user copies some text, Keylogger Remote will surely record it.
Elite Keylogger – RLM: 5 / 1 / 1
Elite Keylogger tracks user activity absolutely invisibly: capture keystrokes, chats, emails, passwords, screenshots, much more. Password tracker will capture all usernames and passwords typed, including email and social network logins. Invisible keylogger can read instant messages (IM), chat and email typed on the computer.
KGB SPY (КГБ) – RLM: 7 / 1 / 0
KGB SPY runs secretly on your computer gathering data on what users type in various text fields, word processors, chat software and so on. Advanced keylogger can covertly e-mail the results as well as monitor user input for specific words or phrases and notify you when a person types them.