4shared

Keylogger are Safe ?????

 

Generally we see in social sites people post Hack Facebook, orkut, gmail, passwords and all these things with key-loggers.

 

Now What exactly a keylogger ???

A keylogger is a type of surveillance software  that has the capability to record every keystroke you make to a log file. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. A keylogger recorder can record Chat history, instant messages, e-mail,  and any information you type using your keyboard. The log file created by the keylogger can then be sent to a specified receiver. Some keylogger  record desktop screen. Unfortunately, keyloggers can also be embedded in spyware allowing your information to be transmitted to an unknown third party.

 
 


 

 
Definition:  keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.It can be used by parents to keep eye on their childrens or company owner to spy on their employes.

Is Key-logger  harmful  for  you ?
  • It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details etc.
  • Example: You login in to your Facebook account from a computer in which keylogger is installthen your username and password will be captured.
 Types of  keyloggers 
          There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard.
                              
                      HARDWARE KEYLOGGER                                  
                     
                        SOFTWARE KEYLOGGER
 
                 
  How to Protect yourself from keyloggers ?
  • Never use your online banking from cyber cafe. If you want to use then you can try this method.open notepad and type anything Then copy and paste each word that comes in your username or password.
  • You can even use above method to protect your facebook profile, yahoo or gmail id.
  • When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

A keylogger program does not require physical access to the user’s computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.

 


 

 
Anti keyloggers

An anti keylogger is a piece of software specifically designed to detect keyloggers on a computer, typically comparing all files in the computer against a database of keyloggers looking for similarities which might signal the presence of a hidden keylogger. As anti keyloggers have been designed specifically to detect keyloggers, they have the potential to be more effective than conventional anti virus software; some anti virus software do not consider certain keyloggers a virus, as under some circumstances a keylogger can be considered a legitimate piece of software.

Live CD/USB

Rebooting the computer using a Live CD or write-protected Live USB is a possible countermeasure against software keyloggers if the CD is clean of malware and the operating system contained on it is secured and fully patched so that it cannot be infected as soon as it is started. Booting a different operating system does not impact the use of a hardware or BIOS based keylogger.

Anti-spyware / Anti-virus programs

Many anti-spyware applications are able to detect some software keyloggers and quarantine, disable or cleanse them.No software-based anti-spyware application can be 100% effective against all keyloggers.

 

Why should use keylogger ?

Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children’s whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.

 

, , ,

8 Responses to Keylogger are Safe ?????

  1. vishaal August 17, 2012 at 12:00 pm #

    which keylogger is best ?

  2. gaurav August 17, 2012 at 12:02 pm #

    keyloggers are torgans (virus) ????

  3. Suyash Srivastava August 17, 2012 at 12:21 pm #

    Vishaal : There are a number of key-loggers in market like family keylogger, adamsx, Award etc .
    you should decide yourself but i like Award key-logger and on the top of the post you can find out name of keylogger like all in one so hav fun..

  4. cybercafe May 9, 2013 at 2:14 am #

    That may be incredibly appealing, You will be an overly expert tumblr. I have got registered your current rss feed and also be upwards with regard to searching for excess of the fantastic submit. Also, I’ve distributed your internet-site inside my social networks

    • swissen May 9, 2013 at 7:52 am #

      Thanks 🙂

  5. online booking systems May 30, 2013 at 1:29 pm #

    Its like you learn my mind! You seem to understand a lot approximately this, like you wrote the book in it or something. I think that you can do with a few p.c. to force the message home a little bit, but other than that, this is fantastic blog. A fantastic read. I will definitely be back.

Trackbacks/Pingbacks

  1. Moniter your Computer activities without any software like key logger. - guru.swissen Blog - September 13, 2012

    […] you are using against experts i will prefer you to use Keylogger and you can get detailed knowledge here Click on […]

Leave a Reply