KGB Spy no longer sends logs. "Spy KGB" rested

Functionality The programs allow you to establish an invisible mode of operation, so no one will guess what the most real keyboard spy watches. KGB Spy at the work of the computer: writes information entered from the keyboard, data from the exchange buffer, monitors visited sites.

The information collected during monitoring is stored in the database to which only you have access. You can get on your electronic drawer Letter with detailed information about who, when and what did on the computer. You just need to look from time to time to your mail.

If your computer uses not only you, but also your child, the problem becomes full of growth. On the Internet, there are enough resources that are not rather suitable for watching children.

In addition, in recent times, cases of crimes committed in relation to children who use Internet chats to seduce juveniles have become more frequent. Restrict the child's access to dubious resources is extremely difficult, and it is almost impossible to prohibit access to chat rooms. Optimal decision It can be the use of a system of monitoring the actions of your child on a computer and on the Internet.

Sales of your company fell by 50% and best Manager Because of themselves sometimes inadequate? When you enter, he sucks something convulsion on the keyboard! If you need to check the use of computing resources in the workplace by employees of your organization, you can not do without a computer control and monitoring system.

There are both hardware solutions, such as hardware-software complexes that combine the use of the simplest camcorder with the supplied software. Such solutions have both advantages and a variety of shortcomings, starting with their high cost and ending with their incompletely compliance with the task of tracking the efficiency of operation, as well as the inappropriate use of computing equipment.

Provides a convenient, intuitive interface to track user activity behind your computer. The product is able to track and save to the file on the hard disk of the key clicks on the keys, allowing you to control the labor productivity of workers in the workplace or ensure the safety of your child in chat rooms.

Or recently it likes that your favorite is from you? It does not store any messages in his ICQ, all files from the computer have been transferred to the USB flash drive, it works on the Internet only when you are not there! All visited websites are also added to the report along with the illustrations - instant screen photos!

You can not understand what is happening. You are not offered for the child, a loved one or an employee - you are offered a reliable assistant in obtaining the necessary information - a spy program.
The unique feature of the product is the response system to enter certain keywords or phrases.

Can send you an e-mail or notify you in other way if the user enters keyword From the list of you specified.

08
dec
2010

KGB Spy 4.2.1.804

Year of release: 2009
Genre: computer monitoring, parental control
Developer: Mipko.
Developer website: http://www.kgbspy.ru/
Interface language: Multilingual (Russian is present)
Platform: Windows XP, Vista, 7
System requirements: Processor: 1GHz, RAM: 256 MB
Description: KGB Spy 4.2.1.804 is salvation for those who want to see what their employee (husband, wife, child,
iT) is engaged on a computer when you are not near. The program has a number of features customizable
under the user. From them: Pressed keys, Screen Snapshots, Program Activity, Exchange Buffer,
visited web sites, computer activity. There is a two-level password protection.


08
jul
2015

Bandicam 2.2.3.804 Repack by Kpojiuk

Year of release: 2015
Genre: Removing screenshots, screen capture
Developer: Bandisoft.
Developer's website: http://www.bandisoft.com/

Build Type: Repack
Bigness: 32/64-bit
Operating system: Windows XP, Vista, 7, 8.1, 10
Description: Bandicam Allows you to record a specific area on the PC screen, or in a program that uses DirectX / OpenGL graphic technologies. Bandicam will help you execute a video with a high degree of compression, keeping the quality of the video closer to the original work and provides performance much higher than others ...


26
jul
2017

The KMPlayer 4.2.1.4 Repack by Cuta (Build 2)

Year of release: 2017
Genre: Multimedia Poleer
Developer: By Cuta
Developer site: KMPlayer.com
Interface language: Multilingual (Russian is present)
Build Type: Repack
Bigness: 32/64-bit
Operating system:
Operating system: Windows XP, Vista, 7, 8, 10
System Requirements: Disk Places: 200 MB
Operational memory: 256 MB, for SVP 1GB
Processor: Pentium 4 and above Video card with support: DirectX 9.0
Description: The KMPlayer is a powerful multimedia player, designed to play audio / video files of almost all possible formats. Make sure and experience it in ...


03
jul
2012

Galaxy On Fire 2 1.0.4.4 ENG

Year of release: 2010
Genre: Arcade
Developer: FishLabs.
Developer's website: http://www.fishlabs.net/en/
Interface language: English
Platform: Android
System Requirements: Android 2.3. The game goes on all devices with GPU Adreno 200/205 (Snapdragon) (Qualcomm QSD8X50, MSM7X27, QSD8X50A, MSM7X30, MSM8X55)
Description: Galaxy On Fire 2 ™ sets new criteria for video games and offers the quality and depth of the game that do not have analogues in the genre of science fiction. Open for yourself a galaxy consisting of more than 20 solar systems and 100 space stations in a three-dimensional image. Epic, full ...


01
oct.
2012

Ls 2-NDFL ADV-6-2 RSV-1 4-FSS 2.00 dated 09/30/2012

Year of release: 2012
Genre: Accounting
Developer: Lugasoft
Developer site: www.lugasoft.ru
Interface language: Russian
Assembly type: Standard
Bigness: 32/64-bit
Operating system: Windows XP, Vista, 7
Description: Preparation and formation of information in in electronic format Forms 2-NDFL, ADV-6-4, SZV-6-3, ADV-6-2, SZV-6-1, SZV-6-2, RSV-1 and 4-FSS. Input of income certificates individuals, information of personalized accounting and calculations on accrued and paid insurance premiums, as well as the formation of files for transferring tax agents and payers of insurance premiums of information ...


03
feb.
2010

Year of release: 2009
Genre: Recording Disc
Developer: Nero AG
Developer's website: http://www.nero.com/
Interface language: Multilingual (Russian is present)

Description: Nero 9 is a set software Digital Multimedia and Home Next Generation Entertainment Center, which enjoys the greatest confidence in the world. It characterizes advanced functionality, thanks to which it is so easy to enjoy digital multimedia. This easy-to-use, but powerful multimedia set gives you the freedom to create, read, copy, record, edit ...


21
aug.
2012

Native Instruments - Kontakt 4.2.3 + Update 4.2.4 Repack

Year of release: 2011
Genre: Sampler
Developer: Native Instruments GmbH.
Developer site: http://www.native-instruments.com
Interface language: English
Build Type: Repack
Bigness: 32/64-bit

System requirements: Intel Core Duo Or. AMD Athlon. 64, 2 GB RAM
Description: Native Instruments Kontakt 4.2.3 - a new version The legendary professional sampler, which for many years is considered the most ideal solution for the production of high-end musical products from Native Instruments. It is under this sampler that music is being produced ...


19
may
2011

HTC HOME 2 2.4.223.1 Portable

Year of release: 2011
Genre: Widgets
Developer: Stealth
Developer's website: http://www.htchome.org
Interface language: Russian
Assembly type: Portable
Bigness: 32/64-bit
Operating system: Windows Vista, 7
System requirements: Internet connection (possibly through a proxy server), Mounted Microsoft..Net Framework. 4
Description: HTC Home. 2 - Widget with clock, weather forecast and realistic animation.
Extra. information: Fast access HTC Home 2 uses the options for Windows 7 taskbar - Displays current weather in the taskbar without switching to the program window. In order to find out the pace ...


11
feb.
2013

Overloud - Breverb 2 2.1.4 Repack

Year of release: 2013
Genre: Reverb
Developer: Overloud.
Developer Site: Overloud
Interface language: English
Assembly type: RePack by R2R
Bigness: 32/64-bit
Format: VST, RTAS
Operating system: Windows 2000, XP, 2003, Vista, 2008, 7
System Requirements: VST Supporting Host Application.
Description: Overloud - Breverb 2 is a high-quality software reverberator created by the sample of known hardware devices. It includes seven different reverb algorithms - Hall, Room, Plate, Inverse, Spaces Small, Spaces Large and Sources each of which is precisely modeled and break ...


07
jan.
2010

Genre: Synthesis Speech
Developer: Soytov-Kharitanovsky
Developer's website: http://www.mp3book2005.ru/
Interface language: Russian
Platform: Windows XP, Vista, 7
Description: Many computer users do not even suspect that the computer can speak, with something the quality of the synthesized computer voice is even better than in many fantastic films and is already almost indistinguishable from the usual human speech. Audiobooks have recently been widely distributed worldwide. IN different countries Different names were entrenched behind them: Audiobook, MP3-Book, "E-Book", "Go ...


28
may
2017

The KMPlayer 4.2.1.2 Repack (+ Portable)

Year of release: 2014
Genre: Firmware
Developer: Highscreen.
Developer's website: http://highscreen.ru/
Interface language: Multilingual (Russian is present)
Platform: Android
System Requirements: 1 GB internal memory, 1 GB random access memory
Description: Updated firmware version for Highscreen Zera_S (Rev.a) Installation of firmware1. Download the utility for the firmware https://yadi.sk/d/dim7kjzeppcie 2. Download and install the preloader driver USB Vcom Driver https://yadi.sk/d/zlbie_wqppcxe 3. Run SP Flash Tool, In the Scatter-Loading field, select the MT6582_Android_scatter.txt file, which is located in ...

29
but I
2010

CoolBook 2.1.4.

Year of release: 2009
Genre: System Setup, System Optimization
Developer: CoolBook
Developer's website: http://www.coolbook.se/
Interface language: English
Platform: only Intel

Description: The program is created to prevent MacBook overheating. The program can donate the temperature, the power of the screw, and much more ... Coolbook Lets You Monitor CPU Frequency, Voltage, and Temperature. Registered Users May Set Voltage and Frequency Manually. This Can Dramatically Reduce Heat Dissipation and Fan Noise. Use Your MacBook with Full Performance W ...


30
but I
2010

VirtualHostx 2.4.1.

Year of release: 2010
Genre: Virtualization
Developer: Tyler Hall
Developer website: http://clickonyler.com/virtualhostx/
Interface language: Russian
Platform: PPC / Intel Universal
System Requirements: Mac OS x 10.5 and above
Description: VirtualHostx makes it easy to place multiple websites on your Mac. it perfect solution For web designers working on more than one project at the same time. With VirtualHostx you can easily create and manage virtual hostams With a few mouse clicks. Now VirtualHostx offers more significant control over your aPACHE settings, and Ra ...


Spy KGB Spy. Allows you to establish an invisible mode of operation, so no one will guess what the most real Cailogger followed. KGB Spy. Immediately monitors the work of the computer: writes information entered from the keyboard, data from the exchange buffer, monitors visited sites.

How to detect and remove KGB Spy spy.

How to protect your personal information using the Mask S.W.B program from one of the most popular keyboard spies - KGB SPY programs.

Like computer usernot possessing knowledge in the field information security, detect the spy hidden in your system, and protect yourself from the surveillance without removing the keylogger from the computer to mislead the one who follows you? And how to remove spy KGB Spy.If you decide to do it? Consider the situation on the example of the common keyboard spy KGB Spy. and programs Mask s.w.b.which creates a protected platform for the user.

After starting the Mask S.W.B antiskon, click the System Processes button.


In the system processes window you can see all running processesexcept hidden.

To see if you have a program that is hidden on your computer, click the "Hidden Processes" button.


In the hidden processes window, scroll through the runner to the bottom. All hiding programs (rootkits) will be highlighted in red.


In the figure above, we see a spy program for name KGB Spy.. This keylogger is configured to hide your actions and follow the user.

If you want to delete KGB Spy, select "Open folder with the application" item in the context menu.


In the window that opens, run the uninstallation of the program and the spy will be deleted.


If you want to simply hide your actions from the keyboard spy and thereby mislead the one who follows you, go to the platform by clicking the button with the name of the program, as shown in the figure above.

Inside the Protection Platform, those programs that hide themselves from the user (rootkits) can be seen simply in the processes window.


Program Mask s.w.b. Creates a secure environment in which it allows you to do everything, but the behavior of the user becomes uncontrollable for spyware.


Your actions made in a protected platform will not be able to see spies - and therefore, and transfer information about them to their owners will also fail. Mask s.w.b. Protects from the removal of video from the monitor screen, from removing screenshots, does not allow to receive data from the keyboard and the clipboard. In addition, he hides websites visiting you and other information about your actions.

If you find a spy that your wife or your husband set you (well, or the boss at work), - do not rush to delete it. Think: perhaps, it is better that they think that you do not do anything to them unknown on the computer, as it will be clean in the spy. And in the meantime, you can in the platform Mask s.w.b. Do what you wish.

In the picture below, we see that the spy KGB after the actions produced in the Mask S.W.B disguise platform could not fix anything.


The program-mask is hiding the user's actions from all existing on this moment Spies. With it, you can detect and destroy computer spies operating at the level of the system drivers of the kernel and invisible for antiviruses.

Download the program Antiskon - Mask S.W.B mask and check whether the surveillance is performed using KGB Spy
Briefly about:
KGB Spy (unique "keyboard spy")

The functionality of the program allows you to establish an invisible mode of operation of KGB Spy, so no one will guess what the most real "keyboard spy" follows. KGB SPY imperceptibly monitors the operation of the computer: writes information entered from the keyboard, data from the exchange buffer, monitors visited sites. The information collected during monitoring is stored in the database to which only you have access. You can get a letter to your email with detailed information about who, when and what did on the computer. You just need to look from time to time to your mail.

The main features of the KGB spy
* Visible / Invisible Mode
* Capture keys on the keyboard
* Monitoring the clipboard
* Recording screen pictures (screenshots)
* Monitoring visited websites
* Notifications to the electronic box about the set of prohibited words
* Very comfortable and understandable interface
* Sending logs on e-mail and ftp

We will collect an assembly with quiet installation in the system, and so let's start:
1. First, download the program http://www.multiupload.com/oqgkcmm1uu (medicine inside)
2. Install KGB-Spy, in the version window, choose KGB Employee Monitor

3. Setup and Description:
In the first launch of the program, turn off log administration (red such a button)

Users - here should write the taking into accounts for your size

In monitoring, remove all the checkboxes

Pressed keys - put the checkbox where you need and press apply

Screenshots - Obraim how much time it is necessary to make a screenshot, it can be used to make a screenshot when opening a new window
Screenshot Type Active window and full Screen - Obraim necessary
Quality of the screenshot, guarded by desire (if the quality is maximum and the Internet sacrificed "not very" logs will go with a delay)

Program activity and clipboard skip

Website visited - choose the type of interception, you can make a screenshot of the site

Invisibility -
Hot keys - set any combination
Magic Word - Empty

I celebrate the checkmark "Run in the hidden mode"
We celebrate the checkbox "Hide everywhere"

Password optional (password so that no one can change the settings)

Sending - Sending is a mile and FTP, I think it is not worth finding how to configure, everything is clear here, after the setup, click "Test" so that there was no doubt

Alarm - no need)

Filters - skip (at will set up)

Update - Remove the checkbox from "Check Update Automatically"

4. Collect the assembly:
We go to the folder where you installed KGB Spy (you need to open the jet folders)

Copy everything in a separate folder, delete unnecessary (deleted on the screenshot)

The mpkview.exe file copies into a separate folder, for example, on the desktop, after we should be left in the folder 8 files. We go for the key, it lies in C: \\ Documents and Settings \\ All Users \\ Application Data \\ Mpk \\ here it MPK folder copy it to our folder with all files.
MPKView.exe file then you can throw a victim in System32 if there is snob access on the computer logs to see if there is no access you can delete it

Archiev it like this:

Now we have a SFX archive "conf.exe", now we see everything in the folder and again in the SFX archive with such settings:

It seems to be finished with assembly)

Cons of spy:
Does not bypass uac
I noticed in some worth the avast, then the interception of the keys does not work, only the list of processes comes
In the programs where the anti-interception of the keys - also does not bypass

Do all) do not judge strictly my first article) probably a lot of gramatic errors)

Some screenshots with logs in the mail

The article is provided solely for familiarization.
The use of this article entails responsibility in accordance with the current legislation.

User and information system operator

In determining the presence or absence of a sanction on action with information in the information system, it is important to clearly understand the difference between the concepts of "User" (Programs or Computer) and "Operator information system" The concept of "user" is commonly used in many areas of human activity (there are the concepts of "user property", "user animals of the world", "subsoil user", "user of work", "user services", "user computer", etc.) , and the concept of "information system operator" is a special legal, defined in law and not requiring interpretation.

Let's try to figure out the user first. IN explanatory dictionary Russian Ushakov language says that the user is "a person who has in use is in operation some property", that is, on the one hand, a person using a computer can be understood under the user. However, in accordance with Art. 1280 GK, the user - "The face legally owning an instance of a program for a computer or a database instance", thus, the word "user" can also determine the owner of the program instance or database. What of these two concepts relates to our case? Since unauthorized access to information and the creation of malware should be considered only in the context of relations with information (and not relationships with intellectual property objects), the conclusion is unambiguous - in our case, it is necessary to be guided by the interpretation of the Ushakov dictionary. Consequently, in the context of the 28th chapter of the Criminal Code, the user is any person who uses the computer.

Now let's go back to the operator of the information system. According to the definition given in Article 2 of the FZ "On Information ...", "The operator of the information system is a citizen or entityoperating on the operation of the information system, including the processing of information contained in its databases. " If you are limited to this definition, you can make an incorrect output. that the "user" and "information system operator" is the same. However, in part 2 of Art. 13 of the same law: "Unless otherwise established by federal laws, the operator of the information system is the owner of the processing of technical equipment contained in the databases, which rightly uses such databases, or the person with which this owner has concluded an agreement on the operation of the information system " That is, it is not about any user, or either about the owner computer equipmentOr about the face that the owner hired to manage this technique. Thus, such as, for example, a family member of the owner home ComputerSo the firm employee working on corporate technique, being a computer user, is not an information system operator. Therefore, it is impossible to say that such a user needs to receive a sanction on access to information - he simply has no right to give such a sanction. But the owner of the home computer or the director of the company owning computer equipment, such rights have, which is unequivocally indicated in the law. Accordingly, if access to information is authorized by the information system by the operator, then the ordinary user wants or does not want this access to be carried out, this does not care anyone - the operator of the information system implements its legal right.

The main conclusion from the drawn difference is what. Read access to information without user sanction, but if there is a sanction of the information system operator (which is technical level It is implemented using the administrator password) illegal, and a program that this access is implemented, malicious, it is impossible.

If the ordinary user stores in the information system of the employer (or relative or familiar) its own information, then it, as its owner, formally has the right to allow or prohibit access to it. However, as follows from the law and practice, permission or prohibition of "technical access" to the information stored in the information system, controls its operator, and the owner of the information to intervene in the management of the information system is not entitled.

As a result, the following is obtained. If an ordinary user, like the owner of his own information, has an agreement with the operator of the information system and this contract provides that the user has the right to store its own information in someone else's information system, and the information system operator undertakes to take measures to protect against unauthorized actions, then at the end The ends of the approval on access to information in the information system still gives its operator (according to finally agreement with the owner of the information). If there is no such thing, then the user actually provides access to it to the operator of the information system, which makes it the last legal owner. From which again, it follows that it is necessary to determine the "technical access" mode to the information system will be its operator.