TUCoPS :: Spies!
The Keykatch Monitors computer use in the home or the office and insures computer usage policy compliance
This device records all keystrokes in a non-volatile memory for later retrieval. While intended for use as a policy
compliance assurance device, it could also be used to snarf passwords, confidential outgoing emails, the filenames of
accessed documents, and so on. Because it can be installed in 10 seconds, stealth installation is possible. Unlike software
keyloggers, this device does not require shell access to the compromised machine - it just plugs in and works...