Examining the Stealth iBot Computer Spy

stealthibotThe first time I ever saw this technology presented, it was in a closed door session of a Counter Intelligence briefing in a room full of very serious individuals…. “Spies”, if you really must know. After the presentation of its capabilities I remember the stunned looks of unbelief on some of the faces of those individuals….and then the lip curling smiles
that come with the knowing that what we just saw would change everything…..in the world of spying that is.

That lasted about 10 seconds, then the gauntlet was thrown down; “Our anti-virus program will nail this type of threat within minutes” …”we’ve seen this threat before, it’s been floating around for years” …were just a few of the comments from the “Cyber Wizards” in the room. Then the challenge was on!

seeitnowsm

The following examination of the “Stealth iBot Computer Spy” is only a snapshot of the forensic examination that was performed. Here is the condensed version. The Stealth iBot Computer Spy program was installed on a Lenovo laptop running Windows XP and one of the latest “name brand” anti-virus programs. Upon inserting the 1gig USB Flash Drive into the USB port of the laptop, actual installation only took about 10 seconds. The flash drive was safely removed and the Stealth iBot was now silently running in the background, embedded in the operating system. Now ready to capture every keystroke and actual screen shots, down to intervals of every 3 seconds.

scan1scan2An “anti-virus scan” was initiated and took roughly 45 minutes; it resulted in a green checked marked “No Threats Detected” screen of assurance. Not bad, I noticed a couple of the cyber wizard techies whispering to each other.

Next, several name brand “Spy Bot” and Spy killer programs were used to scan the Lenovo, again the “No Threats Detected” screen of assurance, one even boasted “Congratulations, no threats found!” (See pic) By this time it was obvious the Stealth iBot was going to put up a fight. But, it was now time to reinsert the flash drive and see
what the Stealth iBot captured.

The Stealth iBot flash drive was inserted into the USB port of the Laptop and the program booted up immediately. The command was initiated to download the captured information to the flash drive, and took less than 10 seconds! At this point the captured data file rests on the Stealth iBot flash drive and can be moved to another PC, but we elected to drop the captured data file folder on the Lenovo desktop to see what Stealth iBot captured. And capture it did!

There were no less than several hundred perfect screen shot images of everything that was viewed on the Laptop! including the screen shots of all the various scans of the laptop including a separate .html file that opens in your browser of every typed keystroke.

Now here I must digress to add that after the briefing had long since ended, almost everyone who attended the briefing was still present during the scans….including the “cyber wizards” who had been instructed “not to leave the room” until they figured out how to detect this threat!…. And to purchase some as soon as possible! Without a doubt, The Brickhouse Security “Stealth iBot Computer Spy Program” does everything that’s promised and more. Will it defeat any anti-virus program? The short answer is no, but then again it’s not designed to because even if an anti-virus program does manage to detect the Stealth iBot more than likely it will be granted “trusted status” because the file extension will look as though it is associated with the operating system….clever…Huh? What was that you asked?….. Was I able to detect it?? Sure, but that’s what ex-spies do…….we hunt spies.

seeitnowsm

datatheftx-large-150x1501About the Author:

J.D. LeaSure, Counter Surveillance Specialist is the President/CEO of ComSec LLC. He founded the Virginia Beach-based firm in 2007 filling the need for an experienced and knowledgeable Counter Espionage and Technical Surveillance Countermeasures (TSCM) service provider in the greater Virginia/DC Metro area.

About the author  ⁄ BrickHouse Security

BrickHouse Security is the industry's premier supplier of security and surveillance solutions. As a recognized authority in GPS tracking, hidden cameras, employee monitoring and compliance, video surveillance and counter surveillance, we help our customers use technology to get the clarity they need. We proudly serve consumers, businesses of all sizes and the law enforcement community. When you need to know, BrickHouse has the answers.

One Pingback/Trackback

    20 December 2012 at 12:12am
    ... [Trackback]... [...] Read More here: ...
  • My Homepage
  • http://www.bestantispywareproducts.com/ Best AntiSpyware

    very nice review, it is very useful and i might be thinking getting one of this for my computer.

  • Jack

    This guy knows his trade!

    I will be ordering one of these tomorrow.

  • Jack

    This guy knows his trade! I will be ordering one of these tomorrow.

  • sewellyman

    Does this item work on macs

    • http://blog.brickhousesecurity.com brickhousesecurity

      Unfortunately the Stealth iBot does not work on Macs :(

  • sewellyman

    Does this item work on macs

    • http://blog.brickhousesecurity.com brickhousesecurity

      Unfortunately the Stealth iBot does not work on Macs :(

  • ionrye

    does it work on Windows 7?

    • http://blog.brickhousesecurity.com brickhousesecurity

      A Windows 7 version is coming very soon

      • billybobpepsi

        Out of curiosity, would I be able to put the stealth Ibot onto more than one computer? Or does it only install its program onto one computer, then refuse to install on another until I uninstall from the first comp?

        • http://blog.brickhousesecurity.com brickhousesecurity

          You can, but you have to rename the data log file so it doesn’t rewrite over the info from another computer. The file name is usually always the same.

          Hope this helps!

      • http://blog.brickhousesecurity.com brickhousesecurity

        I just confirmed with tech support, that even if you don’t receive a Windows 7 version, you’ll be able to email support@spycobra.com and they’ll send instructions on how to have it upgraded for Windows 7

  • ionrye

    does it work on Windows 7?

    • http://blog.brickhousesecurity.com brickhousesecurity

      A Windows 7 version is coming very soon

      • billybobpepsi

        Out of curiosity, would I be able to put the stealth Ibot onto more than one computer? Or does it only install its program onto one computer, then refuse to install on another until I uninstall from the first comp?

        • http://blog.brickhousesecurity.com brickhousesecurity

          You can, but you have to rename the data log file so it doesn't rewrite over the info from another computer. The file name is usually always the same.Hope this helps!

      • http://blog.brickhousesecurity.com brickhousesecurity

        I just confirmed with tech support, that even if you don't receive a Windows 7 version, you'll be able to email support@spycobra.com and they'll send instructions on how to have it upgraded for Windows 7

  • Ali1981

    My daughter and I share the same laptop and i dont have the administrator password. Im just an authorized user. Will i still be able to install this program? Or do I have to have admin access?

    • http://blog.brickhousesecurity.com brickhousesecurity

      You need administrator access in order for the software to run.

  • Ali1981

    My daughter and I share the same laptop and i dont have the administrator password. Im just an authorized user. Will i still be able to install this program? Or do I have to have admin access?

    • http://blog.brickhousesecurity.com brickhousesecurity

      You need administrator access in order for the software to run

  • Patti

    Would I need administrator access or even to be logged into Windows at all? Our shared computer now asks for ‘current password’ before it ever gets to windows…

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes, you need to be logged into windows with an account that has admin rights.

  • Patti

    Would I need administrator access or even to be logged into Windows at all? Our shared computer now asks for 'current password' before it ever gets to windows…

    • http://blog.brickhousesecurity.com brickhousesecurity

      So yes, you need to be logged into windows with an account that has admin rights.

  • browndense

    I purchased this product!!!! What a waste of money!!! Does not work as it says it will. Totally messed up the computer!!!!!!!!!! Messed up email!!!!!!!!!!!!!! Messed up whole performance of computer!!!!!!!!!!!!!!!! Don't buy it!!!!!!!!!!!!!!

  • Kevin

    When the Windows 7 version is ready, could you read the RETRIEVED data on a Mac?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Kevin,
      Unfortunately you can not retrieve the data on a mac

  • Kevin

    When the Windows 7 version is ready, could you read the RETRIEVED data on a Mac?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Kevin,Unfortunately you can not retrieve the data on a mac

  • EBL

    do you have a list of antivrus programs that have been tested and shown NOT to detect the keylogger? And conversely, are you aware of any specific antivrus software that DOES detect it? Thanks.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi EBL,
      We have tested the device on most modern day antivirus programs including Nortons and McAfee and they were not able to recognize the Stealth ibot. However there is always a possibility that they might come out with an update that changes that.

      • Adventurera

        McAfee 8.7i detects it.

        • Adventurera

          Unless you found a way to go around it?

  • EBL

    do you have a list of antivrus programs that have been tested and shown NOT to detect the keylogger? And conversely, are you aware of any specific antivrus software that DOES detect it? Thanks.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi EBL,We have tested the device on most modern day antivirus programs including Nortons and McAfee and they were not able to recognize the Stealth ibot. However there is always a possibility that they might come out with an update that changes that.

      • Adventurera

        McAfee 8.7i detects it.

        • Adventurera

          Unless you found a way to go around it?

  • maydell

    What is someone breaks into your home, installs this device, then monitors your computer from another location? Do you have any recourse or any way to protect yourself? I have a security expert living in back of me and have had many burglaries. My 'wireless detector' device beeps in areas of my home indicating either bugs or hidden cameras. How do I protect myself?

  • maydell

    Have had many burglaries without obvious entrance into home. Could someone use this device on my computer and then monitor it from another location? If I install a cam/security program in my computer could everything then be viewed from another computer since it may be compromised? How do I protect myself in the event that this device has been installed? Dealing with a security expert who lives in back of me…I may have mics and pinhole cams in my home now as my 'wireless detector' beeps in certain locations in my home!!! I'm up against a pretty sophisticated group!

  • jeffery1973

    I just purchsed the stealth IBOT and still waiting for the order ,,, will it be able to run on windows 7?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Jeffery, most of the new Stealth iBots that are shipping out are Windows 7 compatible, but even if you don’t receive a Windows 7 version, you’ll be able to email support@spycobra.com and they’ll send instructions on how to have it upgraded for Windows 7

  • jeffery1973

    I just purchsed the stealth IBOT and still waiting for the order ,,, will it be able to run on windows 7?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Jeffery, most of the new Stealth iBots that are shipping out are Windows 7 compatible, but even if you don't receive a Windows 7 version, you'll be able to email support@spycobra.com and they'll send instructions on how to have it upgraded for Windows 7

  • jaysonbay

    If I intend to sell the computer I am installing the Stealth iBot on, can it be uninstalled from that computer?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes

  • jaysonbay

    If I intend to sell the computer I am installing the Stealth iBot on, can it be uninstalled from that computer?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes

  • uplandfever

    I wanted to have this Stealth iBot installed in my computer and laptop, However, I wanted to know if this would be detectable with the webwatcher.com that has been installed in there? And would it cause any problem or clash with it. Its kind of I am doing countersurveillance.

  • lisaname

    So if i dont have a passwork to the computer i cannot see anything?
    But in the video it ses we can?

    • http://blog.brickhousesecurity.com brickhousesecurity

      You need to have administrator access to the computer

  • lisaname

    So if i dont have a passwork to the computer i cannot see anything?But in the video it ses we can?

    • http://blog.brickhousesecurity.com brickhousesecurity

      You need to have administrator access to the computer

  • Carly

    Does it work on windows 7 yet?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Carly,
      Yes, the device is now compatible with Windows 7

  • Carly

    Does it work on windows 7 yet?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Carly,Yes, the device is now compatible with Windows 7

  • http://blog.brickhousesecurity.com brickhousesecurity

    Unfortunately we do not know if the device is detectable with webwatcher.com :( But it has an excellent track record of being undetectable with many software suites

  • Lisa

    Hi,
    My son uses my computer and has his own user info/windows password etc… however, say he steps away and does not lock the cpu, will I still be able to install it while its still available for use? Thanks for your time and response.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Lisa,
      As long as he is still logged in, and he has administrator privileges, then you should be able to install it without a problem

  • Lisa

    Hi, My son uses my computer and has his own user info/windows password etc… however, say he steps away and does not lock the cpu, will I still be able to install it while its still available for use? Thanks for your time and response.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi Lisa,As long as he is still logged in, and he has administrator privileges, then you should be able to install it without a problem

  • joe

    with the stealth ibot , will you be able to retrieve msn or yahoo passwords? from persons that used my computer to access or check email…?

  • joe

    with the stealth ibot , will you be able to retrieve msn or yahoo passwords? from persons that used my computer to access or check email…?

  • W.P.K.

    I purchased one of these, not very happy with the performance, especially the keylogger. Sometimes when I insert the device into the USb drive it gives me an error telling me that the one that I just installed is not the orignal one. I have to remove it and reinsert it several times before it will work. Still scratching my head on that one.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi W.P.K. I’m sorry to hear you’re having problems with the device. I’ve forwarded your problem off to our tech support team who can advise you on how to fix the problem.

  • W.P.K.

    I purchased one of these, not very happy with the performance, especially the keylogger. Sometimes when I insert the device into the USb drive it gives me an error telling me that the one that I just installed is not the orignal one. I have to remove it and reinsert it several times before it will work. Still scratching my head on that one.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi W.P.K. I'm sorry to hear you're having problems with the device. I've forwarded your problem off to our tech support team who can advise you on how to fix the problem.

  • matt

    does it automatically install or do you have to open the software and manually install it? and same question for retrieving the info.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes, you do have to navigate to the software and click on the install button. But those are just simple steps. After you click on install, it takes about 5 seconds to complete.

      • Dan

        So, you’re logged in as admin and everything is installed in 5 seconds. I assume you have to be logged in as admin (not a guest) to retrieve the information on the same account (admin)?

        • Dan

          And to follow up…if you need to sell the computer, how to you uninstall the program?

        • http://blog.brickhousesecurity.com brickhousesecurity

          Yes you do need to be logged in as an administrator.
          If you run the program that comes on the thumb drive, there is an option for you to uninstall the Stealth iBot of the targeted computer.

        • http://blog.brickhousesecurity.com brickhousesecurity

          Yes, you should log back in as an admin to retrieve the captured data.
          There is an executable file you need to run off the flash drive to install or uninstall the application.

      • matt

        i understand that the spy bot wont work on a mac however can the retrieved info be viewed on one?

        • Dan

          …and If you can’t view on MAC OS, can you view the retrieved info on a MAC if it has Bootcamp (windows)?

          • http://blog.brickhousesecurity.com brickhousesecurity

            I would recommend only using it on a PC

  • matt

    does it automatically install or do you have to open the software and manually install it? and same question for retrieving the info.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes, you do have to navigate to the software and click on the install button. But those are just simple steps. After you click on install, it takes about 5 seconds to complete.

      • Dan

        So, you're logged in as admin and everything is installed in 5 seconds. I assume you have to be logged in as admin (not a guest) to retrieve the information on the same account (admin)?

        • Dan

          And to follow up…if you need to sell the computer, how to you uninstall the program?

        • http://blog.brickhousesecurity.com brickhousesecurity

          Yes you do need to be logged in as an administrator.If you run the program that comes on the thumb drive, there is an option for you to uninstall the Stealth iBot of the targeted computer.

        • http://blog.brickhousesecurity.com brickhousesecurity

          Yes, you should log back in as an admin to retrieve the captured data.There is an executable file you need to run off the flash drive to install or uninstall the application.

      • matt

        i understand that the spy bot wont work on a mac however can the retrieved info be viewed on one?

        • Dan

          …and If you can't view on MAC OS, can you view the retrieved info on a MAC if it has Bootcamp (windows)?

          • http://blog.brickhousesecurity.com brickhousesecurity

            I would recommend only using it on a PC

  • http://professional-suggestion.com/ Uninstall Program

    It seems to be a great protection.

  • http://professional-suggestion.com/ Uninstall Program

    It seems to be a great protection.

  • ozzierad

    Hi
    I just got one and while it shows me screenshots etc it downloaded a heap of Scr files that I cant open and some registry files, it didnt show me anything but these files some screenshots and an explorer file with some short chat on it,Am I doing something wrong that I cant read the other files or that it isnt showing me other files such as passwords and any emails etc

    • http://blog.brickhousesecurity.com brickhousesecurity

      You cannot open the raw data that is on the flash drive.
      Go back into the ADMIN.EXE file and click on “MOVE SAVED DATA TO PC”.
      When do you this, the software will decode the raw data into readable files.
      Select a location which you want to save these files.
      Once it’s downloaded, you can go back to that location to retrieve the captured information.

      • Ozzierad

        I did download it to another PC, is that the problem, will it only open on original PC

        • http://blog.brickhousesecurity.com brickhousesecurity

          I would recommend contacting tech support: 1-800-654-7966

  • ozzierad

    HiI just got one and while it shows me screenshots etc it downloaded a heap of Scr files that I cant open and some registry files, it didnt show me anything but these files some screenshots and an explorer file with some short chat on it,Am I doing something wrong that I cant read the other files or that it isnt showing me other files such as passwords and any emails etc

    • http://blog.brickhousesecurity.com brickhousesecurity

      You cannot open the raw data that is on the flash drive.Go back into the ADMIN.EXE file and click on “MOVE SAVED DATA TO PC”.When do you this, the software will decode the raw data into readable files.Select a location which you want to save these files.Once it's downloaded, you can go back to that location to retrieve the captured information.

      • Ozzierad

        I did download it to another PC, is that the problem, will it only open on original PC

        • http://blog.brickhousesecurity.com brickhousesecurity

          I would recommend contacting tech support: 1-800-654-7966

  • butterfly

    Can a computer person (IT) detect the ibot on the computer?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi there,
      If you take a look at the above story, it was really hard for a computer forensic corporate espionage person to find it, so I figure that it would be the same for a computer IT person.

      • Debhug

        I just installed the ibot on windows 7. I found evidence of it in the search area. I guess I will see if they notice it or not. I tried to delete any suspious items so I am not sure if it will affect the performance.

  • butterfly

    Can a computer person (IT) detect the ibot on the computer?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi there, If you take a look at the above story, it was really hard for a computer forensic corporate espionage person to find it, so I figure that it would be the same for a computer IT person.

      • Debhug

        I just installed the ibot on windows 7. I found evidence of it in the search area. I guess I will see if they notice it or not. I tried to delete any suspious items so I am not sure if it will affect the performance.

  • turtle09

    I downloaded my information… I had nowhere near 10,000 screen shots…maybe 100 or 200 and the computer had been used for a very long time..there should have been a lot more screen shots and text data logged. There was only text data and screen shots for maybe 2-3 days and the computer was used a lot. Why is this???? Am I doing something wrong? Does it need to be installed again??? Do I need to fix some settings? any help is appreciated.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi there, the problem might have something to do with some system files on your computer that are causing the software to not work properly. I would suggest contacting support@spycobra.com for direct assistance – they specialize in this product in particular and will be able to better help you.

      • turtle09

        Ok..thanks so much! I appreciate the speedy reply. Will do so. Thanks again!!

  • turtle09

    I downloaded my information… I had nowhere near 10,000 screen shots…maybe 100 or 200 and the computer had been used for a very long time..there should have been a lot more screen shots and text data logged. There was only text data and screen shots for maybe 2-3 days and the computer was used a lot. Why is this???? Am I doing something wrong? Does it need to be installed again??? Do I need to fix some settings? any help is appreciated.

    • http://blog.brickhousesecurity.com brickhousesecurity

      Hi there, the problem might have something to do with some system files on your computer that are causing the software to not work properly. I would suggest contacting support@spycobra.com for direct assistance – they specialize in this product in particular and will be able to better help you.

      • turtle09

        Ok..thanks so much! I appreciate the speedy reply. Will do so. Thanks again!!

  • http://www.medyumburak.com medyumlar

    Unfortunately the Stealth iBot does not work on Macs :(

  • http://www.medyumburak.com medyum

    Unfortunately the Stealth iBot does not work on Macs :(

  • Jeff

    Will it also work on 64-bit Windows 7?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes

  • Jeff

    Will it also work on 64-bit Windows 7?

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes

  • Tak_gray

    if i install this on one lap top will i be able to view what it has been collecting on another laptop or can i only view it from the computer it has been installed on

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes, you can view it on another computer

  • Tak_gray

    if i install this on one lap top will i be able to view what it has been collecting on another laptop or can i only view it from the computer it has been installed on

    • http://blog.brickhousesecurity.com brickhousesecurity

      Yes, you can view it on another computer

  • GordonMervin

    n closing, remember that security is not a matter of adding stuff to your system. Security is an attitude, an approach and thought-set.

  • George

    I have Norton 360 in my Computer. Will Norton detect Ibot during or after installation?

  • George

    I have Norton 360 in my Computer. Will Norton detect Ibot during or after installation?

  • kk

    Installation is OK. How do i uninstall if i don’t want use “Ibot” in my computer?

  • KK

    How do i uninstall Stealth Ibot from the computer?

  • kk

    Installation is OK. How do i uninstall if i don't want use “Ibot” in my computer?

  • KK

    How do i uninstall Stealth Ibot from the computer?

  • Leppert4

    What is an administrative password?

  • Leppert4

    What is an administrative password?

  • Frangobr2004

    Hello, please, this Stealth iBot, records everything that is connected to the computer via usb? For example, if I have a barcode reader connected to your computer the Stealth iBOLT will record the data?

  • Frangobr2004

    Hello, please, this Stealth iBot, records everything that is connected to the computer via usb? For example, if I have a barcode reader connected to your computer the Stealth iBOLT will record the data?

  • Frangobr2004

    Hello, please, this Stealth iBot, records everything that is connected to the computer via usb? For example, if I have a barcode reader connected to your computer the Stealth iBOLT will record the data?

  • Frangobr2004

    Hello, please, this Stealth iBot, records everything that is connected to the computer via usb? For example, if I have a barcode reader connected to your computer the Stealth iBOLT will record the data?

  • Disappointed

    I bought this and the trackstick and NEITHER have ever worked! Very disappointed and a LOT of wasted money – with still not solid answers

    • http://www.facebook.com/profile.php?id=1400917128 Lydia Leavitt

      Hey, I’m so sorry about that – did you contact our tech support team?

  • Disappointed

    I bought this and the trackstick and NEITHER have ever worked! Very disappointed and a LOT of wasted money – with still not solid answers

    • http://www.facebook.com/profile.php?id=1400917128 Lydia Leavitt

      Hey, I'm so sorry about that – did you contact our tech support team?

  • guest

    the computer i want to monitor is a PC, but the files will need to be reviewed on a Mac, is that possible?

  • guest

    the computer i want to monitor is a PC, but the files will need to be reviewed on a Mac, is that possible?

  • Guest

    So, does this store the records directly in system? Nothing captured is sent to a remote server like the “nanny” programs do?

  • Guest

    So, does this store the records directly in system? Nothing captured is sent to a remote server like the “nanny” programs do?

  • Malypaw

    I can’t open saved file. Do I need special software for that?

  • Malypaw

    I can't open saved file. Do I need special software for that?

  • Jerry

    Does a user need to be logged on to the computer to install this? In other words, if you don’t know the username/password to login on that machine, can you still stick in the USB drive and install this?

  • Jerry

    Does a user need to be logged on to the computer to install this? In other words, if you don't know the username/password to login on that machine, can you still stick in the USB drive and install this?

  • Josephalthouse

    Not Happy ! Tech support can’t figure this out, and now I am out 150.00 …… Thanks Brickhouse Security.

  • Josephalthouse

    Not Happy ! Tech support can't figure this out, and now I am out 150.00 …… Thanks Brickhouse Security.

  • Almasch

    One more question; you stated that you will be able to use on windows 7 atleast the new versions of it. how will i know if it is compatible. i figure i have 1 min to do all this onto said computer. thats the idea…discrete and furtive. but after reading all these comments…its not so furtive. my main concern is will i be able to retrieve as said on your website, data if the pc is either locked or fresh boot/turned on and password protected. I just ordered one, but if this item does not perform as advertised, “The computer spy quickly bypasses any password protected section of your computer and logs exactly what people are doing on your computer–even if they think they’re protected by a password.”

  • Almasch

    One more question; you stated that you will be able to use on windows 7 atleast the new versions of it. how will i know if it is compatible. i figure i have 1 min to do all this onto said computer. thats the idea…discrete and furtive. but after reading all these comments…its not so furtive. my main concern is will i be able to retrieve as said on your website, data if the pc is either locked or fresh boot/turned on and password protected. I just ordered one, but if this item does not perform as advertised, “The computer spy quickly bypasses any password protected section of your computer and logs exactly what people are doing on your computer–even if they think they’re protected by a password.”

  • Amanda

    I love it! It works just like they said it would and the screen shots are clear and can be taken every 10 seconds. Now I can see what my kids are doing on the computer when I’m at work. It works with more then one computer too. The only bad thing is the keystrokes only show you what the person typed on your computer and not the person they are chatting to. The screenshots show you both ends of the conversation though. So what would make it better is if the screenshots had the date and time on them so you could go right to the one your looking for! But other then that great product!

  • Keith

    I love mine. It does take a little longer to install and configure than indicated but I was still able to do it while the target walked away from the laptop.
    Data retrieval can take anywhere from a few seconds to a few minutes, so you have to be careful that you are going to have enough time. One time I retrieved data while the target was asleep in front of the computer!
    Approximately 10% of the screenshots come out blank for some reason but I still get plenty. It seems like maybe the ones that come out blank do show up on the next retrieval.
    I am glad I purchased this product and definitely feel that I got my money’s worth. Also, the rebate was sent promptly.

  • Basil

    I have it installed on my laptop Win7 x64, works fine except that typed letters do not get recorded as they are entered…sometimes a “Left Shift” is thrown or other crap. Why it cannot record the way the character is typed??
    Not very excited about it!

  • Carol

    This was easy to install and perfect for monitoring teen’s computer. Only drawback was having enough time to download – sometimes taking a few minutes. You have to leave yourself enough time to adequately do this, but viewing was easy on another computer. Great product!

  • Sylvia

    does one need the password and username for the laptop this device will be used on?

  • Pingback: My Homepage()