Hi all.. :D Welcome to the software repository. I hope you are satisfied with the article that we make. Thank you.by : ghufron MT


Lencana Facebook

4/4/12

Keylogger | The concept and use of his or her


(Spy Software) is a hidden program that functioned to monitor any activity related to use of the keyboard keys. Keylogger is very related to the theft of passwords. One of the techniques of hacking that is widely used to take over the confidential data on a person's computer without permission of the authority of the owner of the computer (the administrator).
How does Keylogger work?
Keylogger running in background (hidden) without known owner of the computer. Shortly after the computer, installed a keylogger program will run each computer restart and it is difficult to be detected.Sometimes the Anti virus is also not capable of detecting a keylogger is not designed as a virus.
If the keylogger software is already running, it will monitor any activities of keyboard keys that are pressed, then store it in the form of log (report) that can only be viewed by people you install the keylogger. The Keylogger will show the program's address or open button then what was typed.
Types of keylogger
Based on such use, keylogger consists of two types. Local Keylogger which only works on the local computer and a remote keylogger; a keylogger can monitor computers in the network.
Keylogger running on the local computer are usually consist of only a single program installed on the local computer. Will this Keylogger monitors all activity related to keyboard keys are used. Kelemahanya, since this type of keylogger is used only on the local computer, then report the recorded cannot be viewed from another computer/remote.
While remote keylogger can monitor other computers in a network. This type of Keylogger is usually of the form of the two files. The installer File on your computer the server first installed to monitor and file installer installed on the client computer's second (the victim's computer). You install the second file this method there are a number of ways. The most popular is the use of Trojans. So the program can be installed by itself as a computer virus.
On the basis of his physical form, in addition to software, Keylogger is available also in the form of hardware or the Hardware Keylogger. This type of Keylogger is usually installed in series with the keyboard. Excess Hardware keylogger which is used by many of the world's security company is able to store at least 2 billion data typing or store memory type for 5 years.
Utilization Of Keylogger
Like most other computer programs. Keylogger was originally used to monitor a client computer in the network. However subsequent ability keylogger is widely used to tap another person's computer and steal important information such as username and password e-mail, login accounts, credit cards, etc.
Development Of Keylogger
Keylogger keylogger software development mainly streaked enough. This can be seen from the many companies that provide specialized Software keylogger with best quality. Just look like SniperSpy, Comm-Logger, NetLogger Pro, Remote Logger, etc. Imagine if this keylogger deliberately utilized to perform the Act of theft.
Next, keylogger intelligently also integrates with badware that are intentionally deployed, such as viruses, Trojans, spyware, adware, etc. So you also have to be extra careful if your computer is infected with a virus, trojan, spyware or the like, it could just be all the malicious programs that you install client keylogger activity so that you too can be monitored in real time.
Conclusion:
The initial goal of making the keylogger is actually for the good things, that monitor network activity log to see the keyboard diketikan. With the keylogger administrator can find out chronologically the activities which have been conducted for use in case of an error report.
The next level keylogger is used to steal precious data such as username and password. This action can we work with barring maximize antivirus and antispyware as the first bulwark of computer programs malicious attacks from outside. Prevention of further can be done with the filter programs that are installed on the computer. Make sure the software you get comes from a trusted source. Because software warez generally integrated badware that can just be a keylogger to monitor activities conducted.

No comments:

Post a Comment