Printer Friendly
The Free Library
22,728,960 articles and books


Flagship software application Anti-keylogger(tm) for Microsoft Windows See Windows.

(operating system) Microsoft Windows - Microsoft's proprietary window system and user interface software released in 1985 to run on top of MS-DOS. Widely criticised for being too slow (hence "Windoze", "Microsloth Windows") on the machines available then.
 95/98/ME/NT/2000/XP is the first product of its kind in the world that can provide every computer with strong protection against most types of unauthorized activity monitoring software, both known and unknown.

Anti-keylogger is a program, designed by Raytown, Corp., to combat against various types of intrusion and monitoring programs currently in use or presently being developed worldwide. Unlike the typical "antivirus" approach, it does not rely on pattern-matching, so it may work on new or unknown types of activity monitoring programs.

These applications can help you to detect and eliminate (deactivate de·ac·ti·vate  
tr.v. de·ac·ti·vat·ed, de·ac·ti·vat·ing, de·ac·ti·vates
1. To render inactive or ineffective.

2. To inhibit, block, or disrupt the action of (an enzyme or other biological agent).

) threats to the integrity and security of your computer network.

Scan your system now with flagship software application Anti-keylogger for Windows 95/98/ME/NT/2000/XP Refers to all 32-bit versions of Windows. It specifically excludes Windows 3.x. See Windows.  and find out if your computer activities are being spied upon!

Download an evaluation copy from

Keystroke loggers also walk the fine line between security administration and security breach. As with scanners and sniffers, the question comes down to intent. Some companies use commercial loggers to monitor employees suspected of resource misuse. While most employees might feel this invades their privacy, such monitoring can be useful for capturing of corporate spies. Law enforcement agencies A law enforcement agency (LEA) is a term used to describe any agency which enforces the law. This may be a local or state police, federal agencies such as the Federal Bureau of Investigation (FBI) or the Drug Enforcement Administration (DEA).  may also use keystroke loggers to gather evidence on suspected criminals. On the other hand, staffers may download freeware Software that is distributed without charge and which may be redistributed without charge by its users. However, ownership is retained by the developer who may change future releases from freeware to a paid product (feeware). See shareware, free software and public domain software.  keystroke loggers from hacker warez (soft "wares") Pirated software distributed over the Internet. A warez site may also provide hackers with viruses and Trojans as well as tips, techniques and scripts for gaining illegal entry into networks and systems. It may also offer ways to cheat at online games.  sites to turn the tables and illicitly spy on their boss or coworkers (reports Jay Heiser from "Combating Nonviral Malware", May 2002). Usually Keylogger is the basic part of anyone's espionage or activity monitoring software. Ultimately, as a security tool, Anti-keylogger provides the most privacy when working on a PC.

What People Say About Anti-Keylogger

"Anti-keylogger is in our opinion an even better software solution to detect keystrokers. Due to the sophisticated design, this software is able to detect known as well as unknown keyloggers. We are impressed by the performance and speed from Anti-keylogger,"- say editors of Wilders Security Team.

"Key logging software took center stage last year when it was revealed that the FBI was working on a program called Magic Lantern magic lantern: see stereopticon. , a key logging application that allows access to passwords and other sensitive information. Critics warn of invasion of privacy invasion of privacy n. the intrusion into the personal life of another, without just cause, which can give the person whose privacy has been invaded a right to bring a lawsuit for damages against the person or entity that intruded.  while proponents answer back that it's necessary, given the widely available high-tech tools to which criminals have access. Others who might be interested in monitoring computer use are protective parents who want to keep an eye on to watch.
- Shak.

See also: Eye
 their children's computer use, suspicious spouses, or anyone else prone to snooping -- as long as it's on your own computer in your own home. For the most part, software that eliminates key loggers hasn't been available. But Raytown Corporation gives those paranoid enough over computer monitoring Recording a user's activity on the computer. Computer monitoring programs are used to determine how much time an employee spends on various tasks as well as possible illicit activities.  some ammunition to fight back. The software is called "Anti-Keylogger" and its primary purpose is to hunt down the monitoring program and expose it, so you can delete it.", - writes Mick Lockey (editor of TechTV cable television channel) March 7, 2002 in review "Fight back! New software promises to disable the spyware that monitors keyboard strokes."

System Requirements To be used efficiently, all computer software needs certain hardware components or other software resources to be present on a computer system. These pre-requisites are known as (computer) system requirements and are often used as a guideline as opposed to an absolute rule.  

No special requirements for hardware or software. If your computer can run Microsoft Windows 95/98/ME/NT/2000/XP operating systems Operating systems can be categorized by technology, ownership, licensing, working state, usage, and by many other characteristics. In practice, many of these groupings may overlap. , the program will run.


1 License - $59.95(US) All versions include lifetime support and free maintenance updates. Unregistered version allows only to detect all types of activity monitoring programs. Full functionality, including cleaning out all activity monitoring programs from your PC, is available after registration (i.e. purchase of license).

Special offer for academic institutions, schools and non-profit organizations - multilicense discount about 80-90%.

About Raytown Corporation

Raytown Corp. was founded in 1999. The main specialization is monitoring and anti-monitoring software development. It is independent security software developer corporation where quality is the number one priority.

The company's products and custom solutions may be found in more then 70 countries all over the world including a large number of Fortune 500 companies, law enforcement, government and military agencies.

For more information, visit
COPYRIGHT 2002 Worldwide Videotex
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2002 Gale, Cengage Learning. All rights reserved.

 Reader Opinion




Article Details
Printer friendly Cite/link Email Feedback
Publication:GUI Program News
Article Type:Product Announcement
Geographic Code:1USA
Date:Sep 1, 2002

Related Articles
ZoneAlarm Internet Security Suite 6.5.
Spyware--the hidden threat to business security.
Webroot discovers potential security flaws in Vista.
ZoneAlarm 6.0.

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters