3 steps to secretly spy on everything that happens on your computer while you are away

3 steps to secretly spy on everything that happens on your computer while you are away

The computer spy program Wolfeye Keylogger is enjoying increasing popularity: The monitoring software is only 270 kb in size and uses very few resources. The program makes it possible to turn your own computer into a private investigator.

The small detective program secretly saves all keystrokes in the background without the user noticing. In this way you have access to passwords, chat conversations, Facebook, email, visited websites and much more. The keylogger sends the data to the email address of the supervisor and thus enables complete remote monitoring of the relevant computer.

For example, most users use the Wolfeye Keylogger to monitor employees (who are contractually informed about it) or to monitor children’s Internet behavior. Illegal, however, is the use of third-party computers, as this represents a serious violation of the privacy sphere.

In this article we show you how you can monitor your computer with Wolfeye Keylogger in just 3 steps.

1. Download

Download the software from the developer website www.wolfeye.us. Before you download the program, make sure that you put the download folder into the exception list of the antivirus software. This videos shows in 4 steps how this exception must be made:

The downloaded file is a .ZIP file, which now has to be unpacked in the next step. This is done by pressing the right mouse -> Extract all (see picture to the right). You will then be prompted to enter a password to unzip the .ZIP file. The password is wolfeyekeylogger:

2. Run the Software

Start the software and choose your spy settings by checking the feature boxes: choose If you want the software to run on windows startup, or if you want the keystrokes to be recorded and/or to record screenshots. Set the screenshot interval and select if you want the recorded data to be send to your email address.

Start the program by clicking the “start” button once you defined the desired settings in the control window. To make sure that the program is invisible, you simply need to close the application by clicking on the Windows “X” in the upper right corner. The Software will continue to run hidden in the background:

3. Set the Email settings

In order to set up the correct Email settings you must do 2 things:

1.: Enter the right Email settings for SMTP servers and pick the right port number. and

​2.: you have to make a setting in the Email account to enable Email dispatch with external programs.

Example for Google Mail:

  1. SMTP settings:

SMTP server: smtp.gmail.com

port number: 25 or 465 or 587

  1. Email account settings (for Gmail):

Once you are logged into the google account, open the following website and click on “activate” or enable “Allow less secure apps”:

https://www.google.com/settings/security/lesssecureapps

This Video demonstrates how this is done: