AirDrive Keylogger Max

The AirDrive Keylogger Max is the most advanced keylogger in the AirDrive Keylogger family, with additional connectivity and download options. It works both as a Wi-Fi hotspot, and as a Wi-Fi device, enabling features such as Email reports and time-stamping. Easy to access from any Wi-Fi device such as a computer, laptop, tablet, or smartphone. It also features 16GB of built-in memory (industrial grade), accessible as a USB Hi-speed flash drive.

AirDrive Keylogger Max
  • Records keystrokes from any USB keyboard

  • 16 gigabytes of built-in memory

  • Industrial grade flash memory

  • Memory accessible as a USB Hi-speed flash drive (480 Mbps)

  • 100% stealthy, undetectable for security software

  • Supports over 40 national keyboard layouts

  • Compatible with barcode readers

  • Works as a Wi-Fi hotspot, or as a Wi-Fi device

  • Sends Email reports with recorded keystroke data

  • Supports time-stamping

  • Supports live data streaming over network

  • Connect from any computer, smartphone, or tablet

  • Access keystroke data from web browser, no software or app necessary

  • Retrieve data remotely without touching the device

  • Simple and clear WWW interface

  • Supports WEP, WPA, and WPA-2 network security

AirDrive Keylogger Max

Retrieve data remotely

Unlike traditional keyloggers which work as USB flash drives, you don't need to have physical access to an AirDrive Keylogger to retrieve the logged data. Simply connect to it over Wi-Fi, download the log file, and you're done. You can then hide the keylogger by erasing the log, disabling further logging, or even hiding the WLAN network.

AirDrive Keylogger Max

Compatibility

The AirDrive Keylogger family is compatible with all types of USB keyboards and barcode readers. Just connect the keylogger in-line with the keyboard, and all keystroke data will be recorded. The keylogger is 100% stealthy and does not pop-up as a system device.

AirDrive Keylogger Max

Highly configurable

The AirDrive Keylogger is a powerful surveillance and security tool. The web interface allows to configure the Access Point WLAN settings, as well as a keystroke logging options. Over 40 national keyboard layouts are supported, including the most popular languages and keyboard layouts used throughout the world.

AirDrive Keylogger Max

The Max version advantage

The Max version has a powerful set of features centered around the capability to act both as a Wi-Fi hotspot, and a Wi-Fi device with Internet connectivity. This unleashes a broad set of options, such as email reporting, time-stamping, and live data streaming, enhanced with 16GB internal memory available as a USB Hi-speed flash drive (480 Mbps). For a keylogging device, this essentially means unlimited data storage, accessible both remotely and locally over USB.

Important Legal Notice

The usage of a keylogger is fully legal as long as a clear notice is displayed, informing the user of the monitored equipment about the presence of a keystroke logger. We encourage the use of this equipment only for the purpose of monitoring your own computer, especially for protecting children against online hazards. It is NOT LEGAL to use a keylogger for the purpose of intercepting third party data, especially passwords, banking data, confidential correspondence, etc. If in doubt, please seek legal advice before using a keystroke logger. A good starting point is the U.S. Department of Justice Letter on Keystroke Monitoring and Login Banners, according to which a clear notice should be displayed, warning that user keystrokes may be logged.

AirDrive Keylogger Max

Keyboard compatibility limitations

The device will work with almost all types of physical USB keyboards (it won't work with internal laptop keyboards). It works fine with wireless keyboards, with exception of Bluetooth keyboards. It won't work a few types of keyboards with built-in high-speed USB hubs (primarily Apple A1243 and Dell KB522), for which the Mac/MCP series should be used. Support for some gaming keyboards is not fully guaranteed, as they often use proprietary protocols.

Videos

Images