Catch Cheating Spouse With Keyloggers

In this article we will discuss the functions and types of keyloggers, and how you can use them to confirm or deny your beliefs that your spouse is cheating on you. We will also include information on how to detect a keylogger on computer just to keep you informed on how to protect your pc or laptop. For specific keylogger product reviews, follow the links below to relevant articles. This article is only a general overview on keyloggers and how we can apply them to catching a cheater, not a product recommendation page.

Before using any type of keylogger, spy software, cell phone tracker, GPS device and similar spy gear, be sure to do your own research on your local state laws. Each state law differs in regards to monitoring private activities, and it is absolutely illegal to install keyloggers or similar devices on other people’s properties. It’s common that keylogger manufacturers tell you it’s “100% legal to own” but they usually leave out the part where it’s illegal to use in your state/country, so don’t get in to trouble and do research or you can get sued if you get caught.

 

What Are Keyloggers?

Keyloggers, (also called keystroke loggers, keystroke recorders, or keystroke trackers) are devices or programs that monitor a computer or laptop’s keystrokes. There have also been recent keyloggers designed specifically for cellphones, which are called cell phone trackers, or cellphone spies. This means anything typed into a computer, laptop, or mobile phone will be recorded by your cell phone keylogger.

These spy gadgets or softwares are often used in monitoring employees, or protecting one’s own pc or mac from sleuths who snoop through your files, or copy files without permission. The best keyloggers are capable of storing all keystrokes, passwords[[1], and websites visited on the internet. The more advanced keyloggers even take screenshots and remotely report all their findings to you via email.

 

Types of Keyloggers

There are two types of keyloggers available in the market, the simpler hardware keyloggers, and the more complex software keyloggers. The latter being the more popular form of keylogger, because of the malicious people that spread it on the internet in hopes of stealing your personal information, online bank account or paypal passwords[2].

Before buying anything, make sure that it is compatible with your OS (windows/mac) and that it has a free trial period, or free trial download (limited features and time limit).

1. Hardware Keyloggers

hardware keylogger

Two types of Hardware Keylogger

Hardware Keyloggers are the devices you connect at the back of the PC. These don’t work for laptops unless they are using an external keyboard, which is a rare sight. The advantage of hardware based keyloggers is that they will not require any type of installation. It’s basically plug and play. That means if your personal computer is armed with an antivirus or spy detection software, you will have no chance of being detected. Another pro is that they are portable keyloggers

Before you select your keylogger, make sure you know what type of port your computer uses. Most modern pcs have both, but just to be sure check the back of your computer or unplug your keyboard and look at the port. The two type of hardware keyloggers are the USB keylogger and the PS/2 Keylogger. As seen on the picture to your left, the USB has a rectangular port and the PS/2 has a round port.

The pricing of these keyloggers will depend on the amount of storage space you select. If you use a hardware based keylogger and can give it daily checkups, then you will do fine with a cheap $10 or so version with as little as 2 gigabytes. If you leave the house for days or even weeks, to make sure you record everything that could possibly be typed on your computer get the biggest storage you can get.

The disadvantage of hardware keyloggers is that if your spouse, kids, or anyone you want to monitor when using your computer checks the back/keyboard cord, they will detect it visually, unless they are not very tech savvy. Most people won’t know what that small piece of extra hardware is, very few will.

Although not usually bound by computer/laptop OS, you should check if it’s a windows 7 keylogger only, or windows xp keylogger only, etc.

2. Software Keyloggers

software keylogger

Software Keyloggers

These spy programs are what you can use for both laptops and personal computers. It used to be rare to find a software keyloggers for macs, but they do exist now. The advantage of using this over their hardware cousin is that because it is software based, the features will only be limited by the developers. Common computer monitoring software features are the ability to take screenshots at set intervals, log the websites visited, log instant messenger conversations and save transcripts, and store password files. There are simple keyloggers that function almost identical to hardware based keyloggers, but there are also advanced keyloggers that will let you monitor your computer remotely.

Say you are vacationing, and the only person at home is your spouse or a relative. You could monitor how they use your computer or laptop remotely by having your spy program email you daily reports of the activity it recorded.You can’t do this with a hardware keylogger because those are simple plug and play gadgets, where you need to physically access the data through the computer’s interface.

Another advantage of using a software keylogger is that you will not need to spend more money because you need larger disk space. The software uses your laptop’s or computer’s own hardware to store the data before either sending it to your email, or just manually review it through the interface and delete it.

The biggest pro in my opinion is that if you suspect your spouse is cheating, there will be no chance of them accidentally discovering your plans on monitoring your home computer because they saw the product you ordered. You can download software based keyloggers instantly, most offer a free trial too.

A disadvantage is that some anti virus software targets specific software keyloggers which cause them to either stop working, or be detected. This is a temporary setback if you bought a high quality software based keylogger because these are commonly patched to counter anti viri software. The cycle continues on as both softwares patch over each other.

Make sure, especially for mac users, that your software will be compatible to your OS. Majority of software keyloggers are for windows 7, windows xp, or vista. Mac keylogger softwares are rare, so you should know that any keylogger out there is most likely made for windows unless otherwise stated.

 

How To Detect Keylogger On Computer

Anti Keyloggers are softwares similar to anti virus programs. They can limit the data transferred or completely nullify software based keyloggers. If your current computer or laptop has none, you should install a combination of anti keylogger, anti virus, and firewall softwares to protect you against keyloggers that may be installed in your computer, or (accidentally) downloaded to your computer from malicious websites.

Just because you have installed anti keylogger software does not mean you are fully protected against someone recording your keystrokes on the keyboard, because paid software keyloggers, especially those that are subscription based, will consistently patch their software to make invisible keyloggers, or temporarily undetectable keyloggers. Keylogger detection will never be 100%, no matter what your software provider says. If you want complete, or as close to complete, keylogger detection choose an anti keylogger software that is subscription based, or that guarantees regular updates. Couple that with similar anti virus and firewall programs. The firewall software is just for those specific keyloggers that transmit data remotely via the internet. Commonly used by hackers.

There are absolutely zero ways an anti keylogger software can protect you from hardware keyloggers because the keyboard is directly connected to the keylogger. The data/key strokes are fed first to the keylogger before even reaching your computer, where the software is installed in. But if you’re reading this, then you’ll know to just check the back of your computer to avoid being spied on.

Beware of “Free keylogger downloads”

It’s common to see “Keylogger FREE download!” on a lot of websites, try it yourself and google “spy on computer free” or “free spy software for PC”. Wonder what the catch is? Most of these free software are actually used to track YOUR keystrokes. What they give you may or may not work, but most of these sites are just out to install their keyloggers on your computers to steal your personal information or bank account information. Don’t get tricked into downloading freeware keyloggers.

If you want to save money when trying to catch a cheating spouse, go for the free options described in the setting traps article. Keyloggers, cellphone trackers and other hardware or software is NOT the place where you try and save a few dollars. If you do, you are risking your valuable information being stolen by some hacker by downloading their “freeware” keylogger. If you choose to ignore this warning, you should thoroughly research the product you are downloading, as well as have anti keyloggers, anti virus, and a firewall installed.

A good free firewall is “Zonealarm[3]”, and a good free anti virus is “avast! antivirus[4]”, both are free to download for personal use. IMO, don’t risk it. Would you rather save $30-100, and risk having your information stolen by someone over the internet, or just pick a secure reliable software that won’t infect your PC?

Please try out the free ways mentioned in this site before you download freeware key recorders. I insist. I don’t want you losing your personal information because you wanted to save a few bucks. Most of these malware disguised as freeware are responsible for people losing thousands of dollars from their credit card or bank accounts.

“The log files contained personal information on more than 170,000 victims, including passwords, PINs, user names, and so on. They also contained information, including PINs, on over 10,000 bank accounts, over 140,000 email passwords and the access details of nearly 80,000 members of social networking sites such as Facebook and Hi5.”[5]

 

Additional Information

1. http://msdn.microsoft.com/en-us/library/bb761584%28VS.85%29.aspx
2. http://www.cuhk.edu.hk/itsc/security/isglosry/index.html#K
3. http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm
4. http://www.avast.com/free-antivirus-download
5. http://www.h-online.com/security/news/item/Keyloggers-under-the-microscope-739423.html

How To Catch A Cheating Spouse

Do you already know that your spouse is cheating on you? Just need to be a hundred percent sure before you take action on your relationship? In this article we will list down ways on how you can catch your spouse cheating. Before you read this, you may want to also read signs of a cheating spouse. Below is a general overview on what tools and methods we have at our disposal, follow the relevant links for a more detailed article on each method described. This section will be updated whenever something new has been found that can help us catch a cheating spouse, your suggestions are more than welcome (use the form linked above or leave it in the comments).

Please do your own research on state laws regarding the use of spy tools to monitor someone else’s conversations. I will not be responsible for providing legal advice for you, when in doubt contact a private investigator or divorce attorney.

A quick tip to keep the data that you have gathered secure, we never want cheaters to know we are on to them, is to start a free blogger.com blog and set it to invitation only. That way no one but you can access the things you have written. What I would do is list down every cheating sign I observed from my cheating spouse and the results of using the following methods and gadgets.

 

Ways to catch a cheating spouse

1.Cell Phone Trackers

Have you ever heard of these? These are programs which you install on your cellphones and have it collect data for you. That data is then sent to a server via the internet which you can access through your home computer or laptop. After manual installation on your phone, you can then leave these cell phone spies alone and just remotely access the data. Most of these work for all the latest mobile phones and the quality ones are always made to be undetectable. Their price ranges from $10 dollars a month, to $60 dollars per quarter. Very affordable, very effective. A top pick for catching a spouse who always has a mobilephone handy. We will not be talking about remotely activated mobilephones[1], those are costly and should not be recommended to anyone who is not a professional spy. It is also illegal to monitor other people’s mobile phones, you should only monitor a phone that you own. What we will talk about are cellphone spies that have text monitoring services as well as GPS trackers. Read the full Cell Phone Tracker article.

2. Keyloggershow to catch a cheating spouse

Keyloggers are devices or software that monitor keystrokes on your computer, which is called keystroke logging[2]. Keyloggers can be useful to you if your suspected cheater is on the computer or laptop a lot (nowadays, who isn’t). The only downside to this method of catching a spouse is that laptops have no other option other than using software keyloggers which you need to install because it wouldn’t make sense to add a hardware keylogger onto a¬† laptop. A hardware keylogger is more suitable for desktop computers. It is a small device that needs no installation, other than physically inserting it into your keyboard slot located at the back of the CPU. Downside of the hardware keylogger vs the software keylogger is storage space. With hardware keyloggers you are allotted a certain amount of space depending on the type of keylogger used. Software keyloggers make use of the computer or laptops own storage space, so the difference is immense considering hardware keyloggers only reach up to 12 gigabytes and start costing upwards of $50. Please remember that you should never monitor a laptop or computer that is not yours. Read the full Catch a cheating spouse with Keyloggers article.

3. GPS

Or Global Positioning Systems[3], is a way of tracking a device remotely from your pc or laptop. These devices are commonly attached to cars, but recent cellphone spies are so advanced that they have added this functionality to their software. The commonly found GPS devices will let you monitor the device using Google Maps, which makes it a very very powerful tool. Google Maps even allow you to view webcams located in those areas, and get the complete directions to get to that area, from a chosen area of origin (your home for example). The most solid way of busting the lies told to you by your spouse. No more 5 hour long shopping trips, GPS devices will tell you exactly where their went and for how long. Again, this should never be used to track a car that you do not own. It is illegal to GPS track anything but your own property. Read the full GPS Vehicle Tracking Devices article.

4. Reverse Phone Lookups

Also called Reverse telephone directory[4], is a service that lets you track a phone number, be it cellphone or home phone. You can now reverse phone lookup those unknown numbers that keep calling you! The downside is, some people can pay to get removed off of the reverse phone lookup database. Ever wonder how that telemarketer got your phone number? They used the reverse telephone directory. So if you want your details kept off, you’ll have to pay a fee. Another downside is that you will have to pay a fee to access full reports, I have not found a website that offers reverse phone lookups for free. The common details provided are Phone owner’s full name, address, what type of phone (cellphone or landline), and other associated phone numbers. Read the full Reverse Phone Lookups article.

5. Image Tracking

This is simply a search engine, for pictures. Something that is fairly new technology. It’s not the same as google that you type words, instead you show the search engine images. It also may be referred to as Content-Based Image Retrieval (CBIR)[5]. This is useful if you want to run your spouse’s pictures on a CBIR database to see where those pictures are listed on the internet. There is no fee for this service. There are however, limitation. For example, you find your spouse’s picture and they are with an unknown person who they won’t tell you about so you decide to do a search. You will not find that picture online if that picture is saved somewhere on Facebook or Multiply or any other type of social site that is set to private. Only public websites work, and as of now there are no CBIR companies that are big enough (say like google), who scan the entire internet. Read the full Reverse Image Tracking article

6. Video Surveillance Equipment

Hidden cameras are another effective solution to cheaters who have “visitors” at home while you are away. There are different types of surveillance equipment, and the hidden cameras are a little bit on the expensive side ($100+). What you’ll want to use is something that is small, and motion activated so you do not have to risk running out of storage for capturing video (and audio if you choose). This method has been made famous by a hit TV series called “Cheaters”, with Joey Greco.

7. Private investigators

Private eyes are the last thing you should consider if you do not have the cash. They are the most expensive way to catch a cheating spouse, but they are also the most reliable way. All you do is pay, and they will have every tool described here and more to track and document your cheating spouse’s activities. It is not uncommon to receive a bill of $3k or more for hiring a P.I. to track someone out of town for several days. A private investigator may also provide assistance to your attorney in civil cases such as helping you get child custody, premarital screening, and proving whether or not your spouse is cheating on your or not[6].

8. Setting traps

Something often overlooked, setting simple “traps” can help tell us if there are things going on in our home when we are away. A trap can be as simple as putting a thin see through tape at the back end of your toilet seat. If you are expecting no one to be home, and you apply this toilet seat trap, the most likely situation you would walk into when you get home is the tape would still be there. But if that tape is broken, you’ll know someone has been in your bathroom. Simple, free, effective. Read the full Free Ways To Catch Your Cheating Spouse article.

 

Other Ways To Catch A Cheating Spouse That Is –NOT– Recommended

1. Lie Detector Tests

These are not just expensive, they’re subjective as well. The will of the examiner and how nervous the person taking the test is what will determine whether or not they will look guilty or innocent according to the lie detector. People react differently when lying, and lie detector test examiners have different approaches in “controlling” your response. Lie detectors are not even supported by the scientific community. Trickery, not science, is what is used to get the “truth” out of you. If you would like to find out more about why a lie detectors should never be used, read this book “The Lie Behind The Lie Detector“[7] by George W. Maschke and Gino J. Scalabrini from antipolygraph.org

2. Impersonation

Calling up credit card companies, banks, phone companies, internet service providers and pretending to be someone you’re not is impersonation, or if you do it online it’s called Phishing[8]. Say for example you found out the identity of the person your spouse is cheating on you with, then you use his or her name and pretend to be them in order to phish information, you can and most probably will get sued if they find out about it. Stick to watching for signs of cheating and focusing on your own spouse. Leave the other person alone, avoid all interaction unless you are going to confront them with legally acquired proof that they have been cheating with your spouse.

 

Additional Information

1. http://en.wikipedia.org/wiki/Covert_listening_device#Remotely_activated_mobile_phone_microphones
2. http://en.wikipedia.org/wiki/Keystroke_logging
3. http://en.wikipedia.org/wiki/Global_Positioning_System
4. http://en.wikipedia.org/wiki/Reverse_telephone_directory
5. http://en.wikipedia.org/wiki/Image_retrieval#Search_methods
6. http://www.bls.gov/oco/ocos157.htm#nature
7. http://www.antipolygraph.org/lie-behind-the-lie-detector.pdf
8. http://kb.iu.edu/data/arsf.html#explained