A keylogger is a program that runs in your computers background secretly recording all your keystrokes.Once your keystrokes are logged,they are hidden away for later retrieval by the attacker.The attacker then carefully reviews the information in hopes of finding password or other information that would prove useful to them.
Keyloggers can be either software or hardware based. Software-based keyloggers are easy to distributean infect,but at the some time are more easily detectable. Hadrware-based keyloggers are more complex and harder to detect. For all that you know,your keyboard could have a keylogger chip attached and anythiing being types is recorded into a flash memory sitting inside your keyboard,keyloggers have become one of the most powerful applications used for gathering information in a world where encypted traffic is becoming more and more common.
As keyloggers become more advanced,the ability to detect them becomes more difficult. They can violate a users privacy of months,or even years,without being noticed. During that time frame,keylogger can collect a lot of information about the user it is monitoring.
A keylogger might be as simple as an.exe and a.dllthat is placed in a computer and activated upon boot up via and entry in the registry.Or,the more sophisticated keyloggers,such as the Perfect Krylogger or ProBot Activity Monitor have developed a full line of nasty abilities including :
= Undetectable in the process list and invisible in operation
= A kernel keylogger driver that captures keystrokes even when the user is logged off
= A remote deployment wizard
= The ability to capture http post data (including logs-ins/password)
= The ability to create text snapshot of active applications
= The ability to timestamp record workststion usage
= HTML and text log file export
= Automatic e-mail log file delivery
All keyloggers are not used for illegal purpose. A varietyof other uses have surfaced. K eyloggers have been used to monitor web sites visited as a means of parental control over children. They have been actively used to prevent child pornography and avoid children coming in contact with dangerous element on the web.
Blog Archive
-
▼
2011
(74)
-
▼
October
(20)
- Things That Need To be Avoided on account Adsense
- Making a Profit From Your Traffic
- Keylogger
- Paid URL Inclusion
- Backlink
- How To Get Free Backlinks
- How To Make Use Of Cheap Internet Banner Advertising
- Pros And Cons Of Flash-Based Sites
- 4 Ways To Accelerate Download
- McAfee Internet Security Suite
- How To Maximize BlackBerry Camera
- Tips Email Marketing
- How to Cope With a Slow Computer
- Free Software Download Manager
- 8 Alternative Search Engine Other Than Google
- Tips On Computer Security System Windows 7
- Viral Marketing-Not Using it Could Kill Your Business
- How to Save Laptop Battery
- Spam Buster
- Bellsouth Internet Security Services: Giving your ...
-
▼
October
(20)