PCSTATS     
[X]   Directory of
Guides & Reviews

Beginners Guides
Motherboards by Brand
Weekly Newsletter
Archived Newsletters

Keyghost II Professional Security Device Review
Keyghost II Professional Security Device Review - PCSTATS
The security of computer systems is of major concern to all users. Millions of dollars are spent annually to reduce systems vulnerability. However, a cursory review of published reports reveals that losses due to intentional or unintentional security failures are increasing.
 90% Rating:   
Filed under: Peripherals Published:  Author: 
External Mfg. Website: Keyghost Nov 09 2000   P. Masrani  
Home > Reviews > Peripherals > Keyghost

Operation



With its simple functionality, the KeyGhost II Pro is pretty easy to use. Once you have opened a text editor, simply type in your password on the following menu will appear...

You will come up with a menu in which you can either view the log in full or in part, change the password to access the menu, diagnose the device, format the flash memory, wipe the log, and even specify whether or not arrow keys are to be trapped.

The output of the capture log includes which arrow keys and other non ASCII keys that were typed. In case you cannot interpret the symbols for such keys, all you have to do is look in the manual and refer to the symbol in question.

Changing the password is easy as well.

A screenshot of the diagnose function.

Yep, 128 bit encryption!

< Previous Page © 2023 PCSTATS.com Next Page >

 

Contents of Article: Keyghost
 Pg 1.  Keyghost II Professional Security Device Review
 Pg 2.  Hardware v/s Software
 Pg 3.  — Operation
 Pg 4.  Final Conclusions

 
Hardware Sections 


 
PCSTATS Network Features Information About Us Contact
FrostyTech
PCSTATS Newsletter
Tech Glossary
Technology WebSite Listings
News Archives
(Review RSS Feed)
Site Map
PCstats Wallpaper
About Us
Privacy Policy
Advertise on PCSTATS

How's Our Driving?
© Copyright 1999-2023 www.pcstats.com All rights reserved. Privacy policy and Terms of Use.