Revealer Keylogger


Revealing the Revealer Keylogger

Are keyloggers malicious programs?  No; they’re simply software tools.  They can be used for a host of legitimate purposes, including protecting children and aiding in law enforcement efforts.  But these programs can also be used maliciously in order to spy, monitor, and gather data from unsuspecting computer users.

What is Revealer Keylogger?

Keyloggers are software applications that are able to track and log keystrokes.  Revealer offers both a free and a paid version for users.  The free edition allows users to log every key that is typed on a specific computer.  It can even record passwords that are hidden by asterisks. As always with keyloggers, this one is designed to run invisibly so the person using the computer does not necessarily know he’s being monitored.  This is useful for parents, for instance, who want to keep an eye on their children’s online activity.  They can read emails, texts, instant messages, and see which websites were visited.

Revealer Keylogger’s paid version offers advanced features including invisibility in the process list, on the drive, and at Windows startup.  It also offers delivery via email, local network, and/or FTP (file transfer protocol).  The data is organized into reports and can be viewed from a remote location.

Products like this are often marketed to concerned parents or towards system administrators who want to keep an eye on employee activity at work.  The same features that make Revealer Keylogger so effective for these jobs also make it an ideal tool for spying. 

What is the Risk?

Parents use keyloggers to ensure their children are safe online.  They can read texts and IMs to see who they are talking to and if the conversations are appropriate.  These same capabilities make it possible for someone to capture sensitive data, including credit card and bank account numbers, usernames, passwords, addresses, phone numbers, health information, web activity, and more.  This poses a tremendous risk for those who use their computers for shopping, banking, and other transactions, as well as work or personal research.

A no less serious risk is the violation of your privacy.  Computers are just machines, but they hold very important, and often very personal or sensitive, information.  With a keylogger, someone else can access this data.

How Did Revealer Keylogger Get into My Computer?

Many malicious programs and viruses can be installed on your computer without your knowledge or consent; Trojans disguised as video codecs or email attachments access your system, and then deposit assorted malware stealthily.  Revealer is not a virus, and, while it can be used maliciously, it is not malware.  It does not install via a Trojan; it must be put directly on a computer.  The monitor needs physical access to the computer in order to download and install the program; after that, he/she can monitor and review the information from a remote location. 

If your computer is being monitored by Revealer Keylogger, it was installed intentionally by someone who had access to your computer, if only for a few minutes.

How Do I Know if Revealer Keylogger is Installed in My Computer?

Usually, keyloggers are virtually impossible to detect, and this is done very intentionally.  If a parent installed a keylogger, for instance, that had icons or was listed in the Start menu, it would be ineffective.  If a child can use the computer, he can also delete a program!  Because of this, manufacturers create programs that run invisibly.  They do not appear in the task manager, on program lists, in the system registry, or on the desktop.

The latest edition of Revealer Keylogger, however, has a flaw in that it appears as active in the task manager.  This flaw may make the program less desirable for parents, but it makes it much easier for computer users to detect. This, of course, could change with updated versions, but for now, it appears that this program is relatively easy to spot.

Can I Remove Revealer Keylogger?

Because the program is listed in the task manager, you could conceivably end task to stop it from running. The problem with this is that it is still there; it will launch again on startup. As it does not appear on program lists, you cannot use the Uninstall feature.  Revealer buries itself in your system registry, and while you may be able to find stray files associated with it, this is very difficult.  If you do not remove each and every associated entry, the program simply rebuilds itself and continues monitoring.  Manual removal instructions follow for those with technical experience.

If you suspect you know who installed the program, you could request that they disable it.  You have no way of knowing, however, if they comply, so it is best to take another route to remove Revealer Keylogger. 

Software applications like Malwarebytes Anti-Malware (Malwarebytes has free malware removal) are designed to eliminate every trace of programs like this.  Regular antivirus programs are not effective because legitimate keyloggers like Revealer are not viruses; they are also designed to circumvent these standard measures. Malwarebytes Anti-Malware (Malwarebytes has free malware removal) , on the other hand, is designed specifically for keyloggers and other elusive programs that are difficult to detect and remove.  It is automatic, so you do not risk damaging necessary files or impairing your computer’s performance, and it is thorough so you do not have to worry that Revealer will recreate itself.

When you own a computer, it is your prerogative to decide if you want to use a keylogger to monitor its use.  When such a program is installed on your computer without your knowledge, however, it not only invades your privacy; it puts your data at risk.

Kill Processes:


Delete Registry Entries:


All content copyright 2006-2017, Bonobo Pty Limited. All Rights Reserved.
Privacy Policy | Terms Of Service