Platform to share ur knowledge
HomeHome  PortalPortal  CalendarCalendar  GalleryGallery  FAQFAQ  SearchSearch  MemberlistMemberlist  UsergroupsUsergroups  RegisterRegister  Log inLog in  

Display results as :
Rechercher Advanced Search
Latest topics
» Help for PPT
Wed Jul 31, 2013 12:58 pm by webmaster

» Formating PC
Wed Jul 31, 2013 12:50 pm by webmaster

» AutoDesk 3D Studio MAX
Mon Jul 22, 2013 1:58 pm by webmaster

» General computer related errors
Mon Jul 22, 2013 1:54 pm by webmaster

» ------------------------------->CHIPSET<--------------------------------
Fri Jul 19, 2013 5:14 pm by webmaster

» Motherboard and its components
Fri Jul 19, 2013 5:05 pm by webmaster

» Creating 3D Window Effect
Wed Jul 17, 2013 3:35 pm by webmaster

Wed Jul 17, 2013 3:27 pm by webmaster

» Create A Hidden User Account
Mon Jul 15, 2013 6:16 pm by webmaster


Share | 


Go down 

Posts : 253
Points : 759
Join date : 2012-07-22
Age : 28
Location : VELLORE

PostSubject: KEYLOGGER AND ITS NATURE   Mon Aug 13, 2012 1:35 pm


A keylogger builds a log of everything typed into a keyboard to be
reviewed by a third party. Keyloggers can be used for legitimate
purposes to troubleshoot networks, analyze employee productivity, or to
assist law enforcement, for example; or they can be used for
illegitimate purposes to surreptitiously spy on people for personal
gain. A keylogger can be a hardware device or a software program.

The most common hardware keylogger plugs into the computer’s keyboard
port, connecting to the keyboard cable. It can look like an extension
tail or in other cases a small cylindrical device. This makes it easy to
spot, if looked for, but it won’t be detectable by software. Models are
priced around the number of keystrokes they can hold, with higher
capacities being more expensive. One entry model costs $49 US Dollars
(USD) with a capacity of 128,000 keystrokes.

Once installed, the log is retrievable through opening a word processor
and entering a password to reveal a hidden keylogger menu. Like all
hardware keyloggers, it has the limitation of requiring physical access
to the system, but might be used by network administrators or by parents
to monitor the family computer.

Another type of hardware
keylogger is preinstalled inside the keyboard itself on the circuit
board. This device is undetectable barring disassembly of the keyboard,
but does require replacing the existing keyboard. A similar keylogging
product can be soldered on to the circuit board of any keyboard, but
this requires some skill.

Software keyloggers are often
installed through malware like Trojans, viruses, spyware or rootkits.
These keyloggers can collect keystrokes through a number of methods,
depending on design. Some keyloggers work at the kernel level; others
use a hook to hijack system processes that manipulate the keylogger; and
still others use entirely different means. A keylogger that is
installed remotely through malicious means secretly sends its logs to
the person who planted the device via an Internet connection.
Back to top Go down
View user profile

Posts : 46
Points : 54
Join date : 2013-06-05

PostSubject: Re: KEYLOGGER AND ITS NATURE   Thu Jun 13, 2013 3:33 pm

Thanks dude for sharing this info. It's very useful...
Back to top Go down
View user profile
Back to top 
Page 1 of 1
 Similar topics
» Trojan-BNK.win32.keylogger.gen

Permissions in this forum:You cannot reply to topics in this forum
Computer and Technology :: Computers and Devices-
Jump to: