A key logger could be in the form of software or hardware and it collects and records all key strokes that are typed. The recorded information could be used by a computer attacker to gain access to information or the computer system.
The collected information will then be emailed to a pre programmed email id. Also these programs does not run as applications on the installed computer and is difficult to detect.
Due to the small size and the fact the key board is connected at the back of the computer these are also very difficult to detect once installed.
Keystorke Recorder & www.softdd.com
or
Keystorke Recorder & www.cnet.com
Below screen is displayed if you follow link 1.
Software keylogger
A software key logger could be installed via a computer virus or a Trojan.The collected information will then be emailed to a pre programmed email id. Also these programs does not run as applications on the installed computer and is difficult to detect.
Hardware keylogger
A hardware component that could be inserted between the key board connector cable and the computer keyboard port. The attacker must have physical access to the computer to install and remove the device once the information is captured.Due to the small size and the fact the key board is connected at the back of the computer these are also very difficult to detect once installed.
Installing a keylogger software
Below steps demonstrate how to install a software key logger on a computer and how the data will be captured once it is in operation.Step 1 - Download key logger
The particular keylogger used for this task is Keyboard Collector and can be downloaded fromKeystorke Recorder & www.softdd.com
or
Keystorke Recorder & www.cnet.com
Below screen is displayed if you follow link 1.
No comments:
Post a Comment