AirDrive Forensic Keylogger Pro
The AirDrive Forensic Keylogger Pro is an enhanced version of the AirDrive Forensic Keylogger, with additional connectivity options. It works both as a Wi-Fi hotspot, and as a Wi-Fi device, enabling features such as Email reports and time-stamping. Ultra-small, only 0.4" (10 mm) in length, and easy to access from any Wi-Fi device such as a computer, laptop, tablet, or smartphone.
Records keystrokes from any USB keyboard
Smallest keylogger on the market, only 0.4" (10 mm) long
Stores 8000 pages of text
16MB internal flash memory
100% stealthy, undetectable for security software
Supports over 40 national keyboard layouts
Compatible with barcode readers
Works as a Wi-Fi hotspot, or as a Wi-Fi device
Sends Email reports with recorded keystroke data
Supports live data streaming over network
Connect from any computer, smartphone, or tablet
Access keystroke data from web browser, no software or app necessary
Retrieve data remotely without touching the device
Simple and clear WWW interface
Supports WEP, WPA, and WPA-2 network security
Memory protected by hardware encryption
Size is an unquestionable advantage in surveillance, security, and forensic applications of keyloggers. And with 0.4" (10 mm) in length, the AirDrive Forensic Keylogger is by far the smallest keylogger available on the market!
All AirDrive devices act as Wi-Fi hotspots. You can connect to them with any Wi-Fi device, such as a smartphone, tablet, or laptop without even touching the device! The AirDrive device will then present a webpage with the data log and configuration options. No additional software or drivers necessary.
Retrieve data remotely
Unlike traditional keyloggers which work as USB flash drives, you don't need to have physical access to an AirDrive Keylogger to retrieve the logged data. Simply connect to it over Wi-Fi, download the log file, and you're done. You can then hide the keylogger by erasing the log, disabling further logging, or even hiding the WLAN network.
The AirDrive Keylogger family is compatible with all types of USB keyboards and barcode readers. Just connect the keylogger in-line with the keyboard, and all keystroke data will be recorded. The keylogger is 100% stealthy and does not pop-up as a system device.
The AirDrive Keylogger is a powerful surveillance and security tool. The web interface allows to configure the Access Point WLAN settings, as well as a keystroke logging options. Over 40 national keyboard layouts are supported, including the most popular languages and keyboard layouts used throughout the world.
The Pro version advantage
The Pro version adds a powerful set of features centered around the capability to act both as a Wi-Fi hotspot, and a Wi-Fi device with Internet connectivity. This unleashes a broad set of options, such as email reporting, time-stamping, and live data streaming.
Important Legal Notice
The usage of a keylogger is fully legal as long as a clear notice is displayed, informing the user of the monitored equipment about the presence of a keystroke logger. We encourage the use of this equipment only for the purpose of monitoring your own computer, especially for protecting children against online hazards. It is NOT LEGAL to use a keylogger for the purpose of intercepting third party data, especially passwords, banking data, confidential correspondence, etc. If in doubt, please seek legal advice before using a keystroke logger. A good starting point is the U.S. Department of Justice Letter on Keystroke Monitoring and Login Banners, according to which a clear notice should be displayed, warning that user keystrokes may be logged.
Keyboard compatibility limitations
The device will work with almost all types of physical USB keyboards (it won't work with internal laptop keyboards). It works fine with wireless keyboards, with exception of Bluetooth keyboards. It won't work a few types of keyboards with built-in high-speed USB hubs (primarily Apple A1243 and Dell KB522), for which the Mac/MCP series should be used. Support for some gaming keyboards is not fully guaranteed, as they often use proprietary protocols.