Computer and Technology
Would you like to react to this message? Create an account in a few clicks or log in to continue.


Platform to share ur knowledge
 
HomeHome  PortalPortal  GalleryGallery  SearchSearch  Latest imagesLatest images  RegisterRegister  Log inLog in  
Search
 
 

Display results as :
 
Rechercher Advanced Search
Latest topics
» Help for PPT
KEYLOGGER AND ITS NATURE EmptyWed Jul 31, 2013 12:58 pm by webmaster

» Formating PC
KEYLOGGER AND ITS NATURE EmptyWed Jul 31, 2013 12:50 pm by webmaster

» AutoDesk 3D Studio MAX
KEYLOGGER AND ITS NATURE EmptyMon Jul 22, 2013 1:58 pm by webmaster

» General computer related errors
KEYLOGGER AND ITS NATURE EmptyMon Jul 22, 2013 1:54 pm by webmaster

» ------------------------------->CHIPSET<--------------------------------
KEYLOGGER AND ITS NATURE EmptyFri Jul 19, 2013 5:14 pm by webmaster

» Motherboard and its components
KEYLOGGER AND ITS NATURE EmptyFri Jul 19, 2013 5:05 pm by webmaster

» Creating 3D Window Effect
KEYLOGGER AND ITS NATURE EmptyWed Jul 17, 2013 3:35 pm by webmaster

» BRIDGE INTRO
KEYLOGGER AND ITS NATURE EmptyWed Jul 17, 2013 3:27 pm by webmaster

» Create A Hidden User Account
KEYLOGGER AND ITS NATURE EmptyMon Jul 15, 2013 6:16 pm by webmaster

VISITORS
KEYLOGGER AND ITS NATURE Flags_1

 

 KEYLOGGER AND ITS NATURE

Go down 
2 posters
AuthorMessage
shanrajesh
Appatakar
Appatakar
shanrajesh


Posts : 253
Points : 759
Join date : 2012-07-22
Age : 33
Location : VELLORE

KEYLOGGER AND ITS NATURE Empty
PostSubject: KEYLOGGER AND ITS NATURE   KEYLOGGER AND ITS NATURE EmptyMon Aug 13, 2012 1:35 pm

KEYLOGGER AND ITS NATURE

A keylogger builds a log of everything typed into a keyboard to be
reviewed by a third party. Keyloggers can be used for legitimate
purposes to troubleshoot networks, analyze employee productivity, or to
assist law enforcement, for example; or they can be used for
illegitimate purposes to surreptitiously spy on people for personal
gain. A keylogger can be a hardware device or a software program.

The most common hardware keylogger plugs into the computer’s keyboard
port, connecting to the keyboard cable. It can look like an extension
tail or in other cases a small cylindrical device. This makes it easy to
spot, if looked for, but it won’t be detectable by software. Models are
priced around the number of keystrokes they can hold, with higher
capacities being more expensive. One entry model costs $49 US Dollars
(USD) with a capacity of 128,000 keystrokes.



Once installed, the log is retrievable through opening a word processor
and entering a password to reveal a hidden keylogger menu. Like all
hardware keyloggers, it has the limitation of requiring physical access
to the system, but might be used by network administrators or by parents
to monitor the family computer.

Another type of hardware
keylogger is preinstalled inside the keyboard itself on the circuit
board. This device is undetectable barring disassembly of the keyboard,
but does require replacing the existing keyboard. A similar keylogging
product can be soldered on to the circuit board of any keyboard, but
this requires some skill.

Software keyloggers are often
installed through malware like Trojans, viruses, spyware or rootkits.
These keyloggers can collect keystrokes through a number of methods,
depending on design. Some keyloggers work at the kernel level; others
use a hook to hijack system processes that manipulate the keylogger; and
still others use entirely different means. A keylogger that is
installed remotely through malicious means secretly sends its logs to
the person who planted the device via an Internet connection.
Back to top Go down
https://computermaniac.forumotion.com
webmaster




Posts : 46
Points : 54
Join date : 2013-06-05

KEYLOGGER AND ITS NATURE Empty
PostSubject: Re: KEYLOGGER AND ITS NATURE   KEYLOGGER AND ITS NATURE EmptyThu Jun 13, 2013 3:33 pm

Hello,
Thanks dude for sharing this info. It's very useful...
Back to top Go down
 
KEYLOGGER AND ITS NATURE
Back to top 
Page 1 of 1

Permissions in this forum:You cannot reply to topics in this forum
Computer and Technology :: Computers and Devices-
Jump to: