How do I Obtain Everything That Has Been Typed on a Computer?
- 1). Install the keylogging software on the target computer. This requires administrative access to the computer. Run the keylogger's setup program. Follow the installation wizard until completion. Popular packages include Refog, Spector Pro and Web Watcher (see Resources).
- 2). Configure the keylogger's discreet mode options. Most keyloggers run silently in the background. The program does not display an icon or window while running. Perceptive users, though, know how to look at running processes to find suspicious software. Keyloggers generally include an option to cloak their presence by running with an innocuous sounding name.
- 3). Set up the keylogger's email options. As the program logs data, it sends a file to a predetermined email address at a predetermined interval. Set up the email address, and how the program sends the log file with newly collected data.
- 4). Test the configuration. Ensure the program is properly collecting data, and email functionality is active. Once confirmed, the program is ready to begin data collection.
Source...