|
|
The security of computer systems is of major concern to all users. Millions of dollars are spent annually to reduce systems vulnerability. However, a cursory review of published reports reveals that losses due to intentional or unintentional security failures are increasing.
90% Rating:
|
|
Home >
Reviews >
Peripherals >
Keyghost |
|
|
Final Conclusions
As you can see from the above
screenshot, the Keyghost was able to reproduce each and every keystroke that I
had made. And I mean every key.
Please do remember that all
Keyghost access should be within a text editor. Since the device processes
keystrokes on the fly, you don't want to accidentally enter the password while
playing Quake3 or surfing the net.
However, the device isn't exactly
foolproof. If an employer wishes to monitor internet usage activity, the
employee can easily navigate through bookmarks and other links (wish may not
make the boss very happy) without any of that activity being recorded on the
Keyghost. The device works only when the computer operator physically enters
keystrokes.
This product is going to attract reactions on the opposite ends
of the spectrum. Some will be furious, many will simply love it. However, it is
not up to us on how "morally correct" this device is. For us, it is how this
product perform. And in our eyes, it performs pretty darn well.
People
who wish to incorporate this device must maintain a certain degree of precaution
as it is not impossible to detect. In case this particular unit does not fit
your needs, you can visit the Keyghost homepage and find one that
does.
The price? For this particular model, the cost of US $249. However,
if you are that serious about security, then price should not be an
issue.
On a final note, it is quite interested how far
surveillance equipment has advanced. The Keyghost detects every keystroke with total
transparency and it is extremely easy to use. And with a capacity of 500,000
keystroke, you can ensure that no activity will go by
unmonitored.
|
|
|
|