Leisure
 » Parental control
 System administration
 » Security
 » » Monitoring software
 System administration
 » Security
 » » Key logger
Sections : Leisure > Parental control | System administration > Security > Monitoring software | System administration > Security > Key logger
Fair visitors rating
Click to RATE : OneTwoThreeFourFive
Buy Free ikeylog download

ikeylog 4.2

Protect your children from internet predators

 

Advertisement

ikeylog 4.2 facilities

Vendor
1088 s 780 w
84651 payson
united States
Vendor`s Webhttp://ikeylog.com
ikeylog webshot
OSWindows 98, Windows 2000, Windows XP, Windows Vista
LimitationsInstall and Uninstall
Actualizedmore than year ago
Downloads551
LocalizedEnglish
LicenseFree to try
Snapshotikeylog snapshot
Snapshot of ikeylog

Use this security logo:

100% SAFE logo

ikeylog manufacturer description

Ensure your computer's security by monitoring all activity on your computer, capturing keystrokes, programs, websites and screenshots. Completely invisible and easy to use, all information captured is stored in an encrypted log file. The log file can be sent secretly at scheduled intervals to any specified email address. All activity in Internet Explorer can be monitored, and webpages are cached for viewing offline. Screenshots can be taken at given intervals, capturing everything that is currently on the screen.Monitor your computer while you are away, retrieve lost information, monitor your children's activity, and much more!
free download ikeylog 4.2QUICK DOWNLOAD
Free download ikeylog 4.2

Advertisement

ikeylog video tutorials

Tutorial not found. Let know us about any useful video tutorial.

ikeylog categories

computer monitor, keylogger, computer spy, parental control, child protection

Given stickers for ikeylog & download buttons

NOTE: move cursor over buttons to get html sources.
smarter
Smarter Choice award means that the price for the value and functions of ikeylog product is rational. Don't pay more than is necessary for the other software. This price is good.
Clean award
DownloadAtlas.com guarantees that ikeylog was tested by antivirus program and is absolutely clean, which means it does not contain any form of malware, including computer viruses, adware, trojans, spyware, rootkits, badware and other malicious and unwanted software.
Report view
ikeylogDemo.zip - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Control - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Error - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Media - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !File - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Icon - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !UIText - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Dialog - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Binary - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Class - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Feature - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !_Columns - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !ProgId - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !_Tables - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !SelfReg - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Registry - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Shortcut - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.FF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !_StringPool - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !TextStyle - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_Controls_COMCATDLL_f0.3207D1B0_80E5_11D2_B95D_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_Controls_Comdlg32ocx_f0.576D64B0_7413_11D2_B954_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_Controls_MSCOMCT2OCX_f0.3207D1B6_80E5_11D2_B95D_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_Controls_MSCOMCTLOCX_f0.3207D1B9_80E5_11D2_B95D_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_Vba_VbRuntime_f0.1E64E430_36E0_11D2_A794_0060089A724B - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_Controls_MSWINSCKOCX_f0.8BB4B550_AA69_11D2_B980_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_System_OLEPRO32_f0.8C0C59A0_7DC8_11D2_B95D_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_System_STDOLE_f1.8C0C59A0_7DC8_11D2_B95D_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_System_OLEAUT32_f2.8C0C59A0_7DC8_11D2_B95D_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_System_OLEAUT32_f3.8C0C59A0_7DC8_11D2_B95D_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > Global_VC_CRT_f0.51D569E0_8A28_11D2_B962_006097C4DE24 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > PO2_8441EA5EF3C6455F90B2F1D6223B7CE4_DCD261836E0B4D9CABCF35404B381B3C - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > PO2_8441EA5EF3C6455F90B2F1D6223B7CE4_9036896AFB9D4A59A73B96BCC561A9BE - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > _15A9A7FEB147411584D77FBE52BB4070 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > PO2_8441EA5EF3C6455F90B2F1D6223B7CE4_AD73F0BCC39B4C3AB3D472727C0564FD - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > _71CEE4BDAA654E0C9DD2077413362B62 - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > PO2_8441EA5EF3C6455F90B2F1D6223B7CE4_C51DDC28BCED4D9C9E123E5BD117E48C - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Instal01.cab > CAB > _F969759825FE47898AF9AEEEB7DD6A8C - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Property - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !ActionText - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Component - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !Directory - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !_StringData - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !CustomAction - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !RadioButton - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !_Validation - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !ControlEvent - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.CF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !EventMapping - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.EF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.ACF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.WF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.SF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.PF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.UpFldrBtn - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Icon._12ca4232.exe - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Icon._12e16818.exe - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Icon._2d9b1389.exe - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !LaunchCondition - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.AWF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.AFF2_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.AFF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.APF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.NewFldrBtn - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.FF2_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.RMF_Bitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !ModuleSignature - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !ControlCondition - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !AdminUISequence - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !ModuleDependency - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !InstallUISequence - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.BannerBitmap - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !ModuleComponents - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !FeatureComponents - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !AdminExecuteSequence - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.RegisterExeBin - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !InstallExecuteSequence - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > !AdvtExecuteSequence - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > Binary.MDAC_REGISTRY_CHECK - CLEAN
ikeylogDemo.zip > ZIP > IkeylogDemo.msi > MSI > [5]SummaryInformation - CLEAN
Get from DownaloadAtlas.com
Get from DownaloadAtlas.com
Do you like ikeylog ? Move mouse cursor over the buttons and just copy one of those links, paste the code you copied right where you want on your blog or website.

ikeylog permissions

On 11/1/2007, Rebrand Software, LLC used their source code to create a compiled program titled ikeylog. Rebrand Software, LLC then transferred Full Resell Rights for the compiled program, titled ikeylog, to ikeylog.com. ikeylog.com is now the legal owner of Full Resell Rights to the Compiled Program named ikeylog.

End user agreement for ikeylog

SECTION I: IKEYLOG

The demo version of ikeylog (the Software) may be distributed freely in its original form. You may install the demo version of the Software on any computer you own or have permission to install on.

The full version of The Software is licensed for the exclusive use of the original purchaser only. It may not be distributed to additional parties.

By continuing this installation you agree that you will not attempt to alter, reverse engineer, or circumvent copy protection in any portion of the Software. You also agree that you are aware that any attempt to circumvent the Software’s copy protection or demo limitations, or to use “pirated” or “cracked” versions of the Software, is in violation of international copyright laws.

SECTION II: COPYRIGHT

ikeylog (the Company) is the legal owner of the Software and all images contained in the Software. You do not have any rights to resell or change any part of the Software. The Company and its contractors retain the right to take reasonable measures to prevent illegal distribution of the Software, including but not limited to disabling or deleting the Software at its discretion.

SECTION III: LIABILITY & INDEMNIFICATION

The Company provides the Software and other services “as is” without warranty of any kind either express or implied, including but not limited to the implied warranties or fitness for a particular purpose. In no event shall The Company, its creators, employees or contractors be liable for any loss of profits, loss of business, loss of data, unsecured transactions, interruption of business, or for indirect special, incidental, or consequential damages of any kind, even if The Company has been advised of the possibility of such damages arising from any defect or error in the documentation, or software.

You shall indemnify, defend by counsel reasonably accepted by the company, protect and hold The Company, it’s creators, employees and contractors harmless from and against any and all claims, liabilities, losses, costs, damages, expenses, including consultants’ and attorneys’ fees and court costs, demands, causes of action, or judgments directly or indirectly arising out of or relating to Software and Services provided.

SECTION IV: LEGAL COMPLIANCE

PenZap may only be used on computer systems where the User has the EXPLICIT AUTHORIZATION of the computer owner, and only in areas where it is legal to use. The Company may suspend or terminate use of the Software and this Agreement immediately upon receipt of any notice which alleges that the User has used the Software for any purpose that violates any local, state or federal law, or law of other nations. In such event, the Company may disclose the User’s identity and contact information, if requested by a government or law enforcement body, or as a result of a subpoena or other legal action. The Company shall not be liable for damages or results thereof and User agrees not to bring any action or claim against the Company for such disclosure.