Monitoring software to monitor and record

Mini Key Log


Mini Key Log monitors and records the activities of all users on a computer unnoticed. The monitoring captures not only the most common activities like keystrokes and visited websites, but also screenshots and many more. Mini Key Log is specially designed to monitor a computer quickly and easily.

Download and test without time limitation

Download7.38 MB

Order your license key

Order Single License 55 USD

Click here to enlarge the screenshot.

Monitoring features

Keylogger

Records all keystrokes, shortcuts, hotkeys and keystrokes in password input fields. The use of the Input Method Editor (IME) for typing East Asian characters are also recorded.

Click here to enlarge the screenshot.

Mouse clicks

Records mouse clicks with the name of the control and text under the cursor. For example, labels of buttons, text input fields, etc.

Click here to enlarge the screenshot.

User logon/logoff

Records the logon and logoff of users with additional information. For example, date of last logon, logon time, number of logins, session, remote server, etc.

Click here to enlarge the screenshot.

Clipboard

Records the text and file names which will be copied to the clipboard by the user. This happens usually by the use of the context menus «Copy» and «Paste» or with the shortcuts CTRL+C and CTRL+V.

Click here to enlarge the screenshot.

Power state

Records the power state, for example, standby and hibernate mode and battery state on laptops.

Click here to enlarge the screenshot.

Data medium change

Records added or removed storage media with additional information. For example, CD, DVD, memory cards, USB flash drives or network drives with additional information, for example, drive letter, device name, device type, serial number and file system.

Click here to enlarge the screenshot.

Dial-up connections

Records dial-up connections with additional information. For example, device name, device type, phone number, user name and password as well as connection time.

Click here to enlarge the screenshot.

File operations

Records the names of files or folders which will be opened, deleted, renamed, copied or moved by the user.

Click here to enlarge the screenshot.

Printer

Records the print jobs which will be sent to the local print spooler in EMF format. Records the complete document, exactly as it was sent to the printer.

Click here to enlarge the screenshot.

Scanner

Records the images which will be read from an image input device by using the TWAIN or WIA interface. For example, devices like scanners or webcams.

Click here to enlarge the screenshot.

Screenshots

Captures screenshots of the windows which will be moved in the foreground and then in the specified interval. The motion detection as well as adjustable values for the size and quality can reduce the size of the records.

Click here to enlarge the screenshot.

Webcam

Captures images from a webcam in an adjustable interval. The motion detection as well as adjustable values for the size and quality can reduce the size of the records.

Click here to enlarge the screenshot.

GPS Position

Records the GPS position in an adjustable interval from a GPS receiver that supports the NMEA 0183 standard.

Click here to enlarge the screenshot.

Visited web pages

Records the web pages which will be visited by the user with the following browsers:
Internet Explorer, Firefox, Seamonkey, Opera (URL only), Chrome (URL only).

Click here to enlarge the screenshot.

More features

Invisible in the process list
Hides the monitoring process in the Windows Task Manager or other process lists. There are also no entries in the Start menu or the list of installed programs.

Selective user monitoring
Excludes users from the monitoring or monitors only certain users.

Automatic uninstall
Uninstalls the monitoring as soon as the monitoring starts on or after the specified date.

Delete records automatically
The records can be deleted automatically. This is helpful to avoid additional effort to delete the records manually.

Protection against unauthorized use
The control-center can be protected with a password against unauthorized use. This password is required to start the control-center on the monitored computer. This feature is only available with a valid license key.

Filter records
The records can be filtered by many criteria. The filtering is very quickly and easily to use. It is usually only one click necessary.

System requirements

Desktop:

  • Windows 8.1 32/64-bit
  • Windows 8 32/64-bit
  • Windows 7 32/64-bit
  • Windows Vista 32/64-bit
  • Windows XP 32/64-bit
  • Windows 2000

Server:

  • Windows Server 2012 R2
  • Windows Server 2012
  • Windows Server 2008 R2
  • Windows Server 2008 32/64-bit
  • Windows Server 2003 R2 32/64-bit
  • Windows Server 2003 32/64-bit
  • Windows 2000 Server

User languages

  • English
  • German
  • Spanish
  • Japanese
  • French
  • Italian
  • Russian
  • Korean


© 7tech Limited