Wednesday, October 3, 2012

KEY LOGGERS

                               key loggers (very dangerous)

                            just imagine a situation  your lap or your computer was observed by  someone.everything was recorded interms of videos, images(snap shots),textual files.it means that your system work was  recorded and these are done at your system, these files may sent to mail to hackers mail or may be collect it by manually

keyloggers--vinays



The hacker may have installed spyware that reports back to the bad guys without the victim’s (your) knowledge.One example is a key logger — a small program that records every key press and mouse movement in an attempt to learn your bank-account numbers, credit-card numbers, and other sensitive information that you probably don’t want strangers to know about. (For more about this insidious stuff


don,t expect  the specified person will target you, there is also some websites who indirectly targets you , Some Web sites try to install these programs on your computer to capture your every key stroke and mouse movement — and report them to who-knows-where. For that matter, many viruses also attempt to install key loggers on your computer. Something about capturing your bank account numbers and passwords 

 

Using Public Computers 

Public libraries, Internet cafes, and other customer-serving establishments have their own computers that customers may use to access the Internet. Are these computers safe for you to use? Tales abound of public-access computers infected with viruses, spyware, and even key loggers, many deliberately planted there in order to elicit information from unsuspecting users. I recall specifically in 2004 a case where a person was arrested for installing a key logger program on a computer in a well-known copy services store in order to record users’ bank account numbers and passwords. This is technology gone awry.Frequently, these computers are configured in a protected
manner, so that users can only use a Web browser and nothing else. But, often, you can’t even view the browser’s security settings, much less change them. So how can you tell if one of these computers is safe? What kinds of things are safe to do on these computers?

be aware while using public computers 

in my next post i will write about how the key loggers are  used with all softwares ans its procesess.........................

dont forgot leave comments , i will consider those as suggesions



***note:: the articles which are in my blog, are completely  for education purpose , i am not responseble of any damage of your system or any other (these are completely education purpose only)


 What are Keyloggers?


keylogging is an act in which  every key stroke pressed by the user of a computer is recorded. keyloggers can perform many other things like taking screenshots,monitoring the system etc.



Types of keyloggers:


           1.hardware keyloggers
           2.software keyloggers


hardware keyloggers:

  

         We plug them between a computer keyboard and a computer. the hardware  contains some internal memory to store the captured data. They are designed to work with PS/2 keyboards. Hardware keyloggers based on USB ports are also evolved recently.

software keyloggers:
  we have heard word malwares. the keyloggers comes under this categery . These are of two types again. They are local and remote keyloggers.


Local keyloggers can be directly installed on a system to moniter its functionality.
where as a remote keylogger can monitor computer that is far away from us. 


So using this, you can monitor a computer from any wher in the world.

***but keyloggers not only for computers but also mobiles 

the basic aim of keyloggers is to monitor the childrens pc as well some networkig use
 but this can be misused by hackers for their autonomous purpose


there are so number of keyloggers available on at online