4MB Keyloggers with Time & Date Stamp and 128-Bit Encryption


KEYKatcher Magnum 4MB Keylogger

  More Unique Features & Highest Memory Capacity of any PS/2 Hardware Keylogger on the Market.

magnum keylogger special


:) Plug & Play keylogger installs in seconds.

:) Record on one PC & retrieve data on another.

:) No software to install.

:) Works with all PC operating systems.
:) TrueStamp Forensics ensure time/date stamps can't be falsified.

:) Captures the DNA of electronic evidence.

:) Time of Use Reports

:) Internal battery keeps time and date accurate.
:) Secure data storage with 128 - Bit encryption.

:) Virtually undetectable by PC software.

:) Safely back up 2,500 pages of data.

:) Memory remains intact when unplugged.




PS2 to USB Adapter Set


  Allows you to use a KEYKatcher Magnum
with your USB keyboard!
Adapter Set Installation Diagram (click to enlarge)

Protect Your Business - Take a Pro-Active Approach to Employee Computer Monitoring
Monitoring employee e-mail, internet and electronic communications isn't a big brother tactic; it's smart business. Employee use of company computer resources can open any organization up to electronic risks. To help control the risk of litigation, security breaches and other electronic disasters, employers should take advantage of technology tools to battle people problems - including accidental and intentional misuse of computer resources.

Increase Productivity & Protect Company Resources
When it comes to workplace computer use, employers are primarily concerned with inappropriate use of internet, e-mail, personal blogs, instant messaging, etc. The KEYKatcher Magnum is well suited to track these activities as well as time spent at the keyboard. Since the KEYKatcher Magnum is so easy to implement, you have the flexibility and swiftness to target possible threats without cumbersome software installation and configuration.

The Best Defense is a Good Offense
Having a plan in place is essential to counteract the risks of inappropriate use of computer resources. Creating and enforcing a clear, acceptable use policy (AUP) is crucial for employers to protect their assets.

Tips for Taking Appropriate Action to Mitigate Potential Risks:
Prepare · Develop clear and concise policies for computer use.
Implement · Install Magnum on every computer you want to monitor.
Monitor · Play back the stored data to determine if any inappropriate activity is taking place. Magnum’s Time/Date Stamps and innovative Time of Use Charts tell you when the computer was or was not in use.
Resolve · Confront alleged compromise with factual documentation. Determine potential risks and take appropriate action.

Magnum Keyloggers are Loaded With These Powerful Features:

128-Bit Encryption

We're serious about data security. The KEYKatcher Magnum features 128-bit AES (Advanced Encryption Standard) encryption for maximum security. The same data security that is commonly used for banking transactions keeps your data safe and secure.

Time/ Date Stamping
It's about time! Know when activities are taking place. KEYKatcher Magnum has built-in time/date stamping with an internal battery back-up. Accurate time is maintained even when the computer is turned off, or the device is unplugged.

Time of Use Charts
Our computer use charts show you at a glance when the computer is being used. Who was using your computer at 3 am on a Saturday morning? Was Joe at work last Friday? These questions and more are quickly answered with our convenient time of use charts. (See screen shot below.)

4 Megabytes of Data Storage
We're serious about storage. The KEYKatcher Magnum can store almost 4.2 million keystrokes. This is over 2,500 pages of text. Whether you're planning on writing a novel, or just looking to record for long periods of time, the Magnum has more than enough storage capacity.

TrueStampTM Technology
TrueStamp technology makes it virtually impossible to falsify time/ date stamps. This extra level of security leaves no doubt about when activity occurs (See screen shot below.)

Records Data at the Source
KEYKatcher keyloggers records keystrokes as they are typed for maximum accuracy and reliability. Software is vulnerable to detection and being deleted. Our secure hardware keystroke recorders step around the rat's nest of software to ensure system stability and ease of installation.

Pause on Playback

Everyone needs a break sometimes. When viewing activity, just press any key to pause the playback. When it is paused, press 'x' to exit, or any other key to view more activity. (See screen shot below.)

Purple Plug & Play Installation
The KEYKatcher is essentially a tape recorder for your keyboard. Just plug it in and it will start recording automatically. No software to install, and no directories to create. Easy to install and easy to use.

Set-Up Instructions
With no software to install, KEYKatcher products are really easy to use. The Magnum is even easier with Set-up instructions built-in to the menu.

Quick Erase
Erasing memory takes about 4 seconds - faster than other KEYKatcher products.

Multiple Viewing Options
Timestamps are great for knowing when activities take place, but can make text difficult to read. Viewing options make it possible to also view text as it was typed without the distraction of extra characters. (See screen shot below.)

Custom Password
A customizable password allows you to change the password from the default to a password of your choice.

NETPatrolTM Search
All KEYKatcher products feature NETPatrol for quick and easy identification of web addresses. NETPatrolT automatically identifies all occurrences of http, www., ".com", and ".net" along with surrounding text. At a glance, you can know what web addresses have been typed on your computer.

Keyword Search
Our powerful search utility allows you to search the memory without downloading the data. Searches save time and allow you to quickly piece together activities.

Battery Meter

Our battery level indicator shows the remaining battery life for peace of mind.


KEYKatcher Keyloggers
256K PS/2 Keylogger

64K Keyloggers

Magnum Forensic Keyloggers


Magnum Helps Protect Your Company Against:

-Workplace lawsuits

-Sexual Harassment

-Internal Hacker Attacks

-Lost Productivity

-Public Embarrassment

-Trademark & Patent  Infringement Suits

-Sabotage & Internet Security Breaches

-Wasted Computer Resources

- Lengthy Business Interruption

-Million-Dollar Legal Fees & Settlements

The Hardware Advantage:

-Can't be detected or disabled by anti-spyare

-Allows recording on one computer and playback on another

-Operating system independent - works on any desktop computer.

-Uses no system or network resources.

-Plug & Play Installation takes only seconds

-Can monitor systems when the password is unknown

Use Magnum to :

-Capture the DNA of electronic evidence

-Investigate suspected illegal computer activities

-Create logs during audits

-Monitor systems in which the password is unknown

-Detect unauthorized use of computer equipment

Payments processed
securely with
Acceptance Mark
or order by phone


Copyright 2006 Allen Concepts, Inc. All Rights Reserved. KEYKatcher name, smile logo are trademarks of Allen Concepts, Inc.