▀▄ ▄▀
▓█▄ ▄█▓
░ ▓██▓▄ ░░▒▓▀ ▄▄ ▀▀▀▀▀▀▀███▄ ▄▄ ▓▄ ▄▄ ▄▓ ▀ ▀▀▓▒▒░░ ▄██▓▓ ░
▓▓▓▓ ▒▒▓▓ █▓▓█ ░░░░ █▓▓▓▌█▓▓█ ▓██▄ █▓▓█▄▄██▓▀▀▀▀▀ ▐▓▒▒▒ ▓██▓
░ ▓▒▒▓ ▓▓▓▓ ▀▀ ▒▒▒▒ ▓▓▓▀ ▀▀ ▓▓▓▓ ▀▀ ▓▓▓▓ ▓▓▓▓ ▓▓▓▓ ░
▒ ▓░░▓ ░▓░░▓▀▓▒▒▓ ▓▓▓▓▀▓▓▄▄ ▓▒▒▓▀▓▒▒▓ ▀▓▒▒▓▀▓▒▒▓ ▓▒▒▓ ▀▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▒
▓ ▓▒▒▓ ▓▒▒▓ ▓░░▓░▓░░▓ ▓░░▓ ▓░░▓ ▓░░▓ ▓░░▓ ▓░░▓░▓░░▓ ▓░░▓░▓░░▓ ▓░░▓ ▓
█ ▓▓▓▓▄ ▓▓▓▓ ▓▒▒▓ ▓▒▒▓ ░▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ░▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▓▒▒▓ ▄▓▒▒▓ █
▀▄ ▀▓████▓▀ ▓▓▓▀▐▓▓▓▓ ▓▓▓▓ ▓▓▓▀▐▓▓▓▓ ▓▓▓▓▌▓▓▓▀ ▓▓▓▓ ▓▓▓▓▌ ▀▓▓▓▓▓▓▀ ▄▀
▀▄ ▀▄ ▀▓▓▀ █▀ ▀▀▀▀▀ ▓██▓ █▀ ▀▀▀▀▀▀▀▀▀▀▀▀▓▀ ▀▀▀▀▀▀▀▀▀▀▀▀▀ ▄▓▓▓▀ ▄▀ ▄
▀▄ ▀▄▄▄▄▄▄▄▄▄ ▄▄ ▄ ▀███▄▄▄▄▄▄▄ ▄ ▄▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▓▓▓▀ ▄▀ ▄▀
▀ ▄ ▄▄▄▄▄▀ ▄▀
░ ░░▒▒▓▓ V i R i L i T Y ▓▓▒▒░░ ░ ░ Eboy ▀
p r e s e n t s
: ┌──────────────────────────────────────────────────────────────────┐ :
|░│ Perfect Keylogger v1.5.3.7 (c) Blazingtools Software │░|
│▒├────────────────────────────────┬─────────────────────────────────┤▒│
│▓│ │ │▓│
│█│ Supplier : TEAM ViRiLiTY │ Release Date : 13th Jun 2004 │█│
│█│ Cracker : TEAM ViRiLiTY │ Disks : 1 x 1,44mb │█│
│█│ Packager : TEAM ViRiLiTY │ Protection : Serial │█│
│█│ │ │█│
:│█├────────────────────────────────┴─────────────────────────────────┤█│:
|│█│ │█│|
││▓│ Requirements: Windows PC │▓││
│|▒│ │▒|│
│:░└──────────────────────────────────────────────────────────────────┘░:│
└─────────── ─── ─ ─ ─ ─ ─── ─────── ── ───┘
│ Release Notes ██▓▓▒▒░░ ░ │
└────────────────────────────────────────────────────────────────────┘
Do you want to know what your buddy or co-workers are doing online?
Or perhaps you want to check up on your children or spouse and know
what they are doing on the computer? With Perfect Keylogger it is
possible in just 2 minutes! This program runs on the installed
computer, fully hidden from its users, and logs everything that is
typed in a protected file. Install Perfect Keylogger and take total
control of the PC!
Perfect Keylogger is a new generation keylogger which is absolutely
undetectable. It was created as an alternative to very expensive
commercial products like iSpyNow, Spector Keylogger or E-Blaster.
It has the same functionality, but is significantly easier to use.
Complex internal mechanisms are hidden from the user behind the
friendly interface. You can install Keylogger and immediately use
it without changing of its settings.
Perfect Keylogger is an extremely compact, award-winning tool. It
is translated into 17 languages and is increasingly popular around
the world! It lets you record all keystrokes, the time they were
made and the application where they were entered. It works in the
absolutely stealth mode. Stealth mode means that no button or icon
is present in the Task Bar, and no process title is visible in the
Task Manager list.
Also, Perfect Keylogger can carry out visual surveillance. It
periodically makes screenshots in invisible mode and stores the
compressed images on the disk so you can review them later.
Our keylogger has unique remote installation feature. You can
attach keylogger to any other program and send it by e-mail to
install on the remote PC in the stealth mode. Then it will send
keystrokes, screenshots and websites visited to you by e-mail or
FTP. You don't have to worry about the firewall alerts - now our
keylogger can be invisible for the firewall program. Our keylogger
supports remote installation, update and removal - no physical
access required!
New Smart Rename feature lets you to rename all keylogger's
executable files and registry entries using one keyword!
One of the most powerful features of Perfect Keylogger is its
advanced Keyword Detection and Notification. Create a list of "on
alert" words or phrases and keylogger will continually monitor
keyboard typing, URLs and web pages for these words or phrases. You
tell Perfect Keylogger which phrases to watch out for - for
example, "sex," "porno", "where do you live," "are your parents
home," "is your wife sleeping," "I hate my boss" - whatever you
decide to include. When a keyword is detected, Perfect Keylogger
makes screenshot and immediately sends email notification to you.
Perfect Keylogger is the first keylogger which is absolutely
invisible in the Windows NT/2000/XP Task Manager.
The program lets you easily view the log file, displaying the title
of the window (for example, title: "John (Online) - Message
Session" in ICQ), the date and time of the action and the contents
of the typed matter itself.
Unlike some other spy software products, Perfect Keylogger does not
send any information to our company. Only you will receive the log
files. We guarantee the absolute privacy, high quality product and
technical support - that's why we have a thousands of satisfied
customers.
You pay once, all updates are free. For example, customers, who
bought the first version in 2002, now can get the advanced latest
version for free! We are producing the new versions very
frequently, so you can be sure that you always will have the most
modern spy software!
──────────────────────────────────────────────────────────────────────
| Install Notes ██▓▓▒▒░░ ░ |
└────────────────────────────────────────────────────────────────────┘
Use our keymaker to generate your personal registration key!
Enjoy ;)
┌────────────────────────────────────────────────────────────────────────┐
│ ┌──────────────────────────────────────────────────────────────────┐ │
||░│ Contacting ██▓▓▒▒░░ ░ │░||
:│▒├──────────────────────────────────────────────────────────────────┤▒│:
│▓│ │▓│
│█│ │█│
│█│ Don't try to contact us. If we think you could support us │█│
:│█│ in any way we will contact YOU. │█│:
|│█│ │█│|
││▓│ │▓││
│|▒│ │▒|│
│:░└──────────────────────────────────────────────────────────────────┘░:│
┌────────────────────────────────────────────────────────────────────────┐
│ ┌──────────────────────────────────────────────────────────────────┐ │
||░│ Greetings ██▓▓▒▒░░ ░ │░||
:│▒├──────────────────────────────────────────────────────────────────┤▒│:
│▓│ │▓│
:│█│ │█│:
|│█│ 0day is competition, so we hate you all. │█│|
││▓│ │▓││
│|▒│ │▒|│
│:░└──────────────────────────────────────────────────────────────────┘░:│
└─────────── ─── ─ ─ ─ ─ ─── ─────── ── ───┘
│ NFO by: Eboy^SAC Updated on 2003-11-25 by TEAM ViRiLiTY │
└────────────────────────────────────────────────────────────────────┘
IF YOU USE THIS SOFTWARE, BUY IT!