The Continual Advancement of the
KeyloggerA
keylogger is a program that
runs in your computer’s background. It will record all your
keystrokes, only you don't know it's there. It secretly grabs your
keystroke information. When you
keystrokes are logged, they are saved and hidden away for the attacker to retrieve later - whenever it's convenient for the
keylogger attacker to do so!
The
keylogger attacker will then review very carefully, your information in the hopes of finding passwords to important and valuable sites - perhaps your payment processor or online bank! A
keylogger/
criminal can quite easily gain confidential emails. This person can then reveal them to others - any interested outside party who is willing to pay for this particular information.
Keyloggers can be either
software or
hardware based.
Keyloggers that are
Software-based are easy to distribute and they quickly infect user computers before they can be stopped by some systems. I don't really have to tell you that avoiding these nuisance
keylogger infections is part of the reason why you should never NEVER run your system without
anti-virus and
anti-malware software.
While
software-based
keyloggers really move quickly and are often hidden in other downloads, they are still more easily detectible than the other type of
keylogger.
Hardware-based
keyloggers are quite a bit more complex and harder to detect than the
software-based
Keyloggers.
For all that you know, your
keyboard could have a
keylogger chip attached and anything being typed is recorded into a flash memory sitting inside your
keyboard.
Keyloggers have become one of the most powerful applications used for gathering information today. In our high-tech world, where encrypted traffic is becoming more and more common,
keyloggers of both types abound with great regularity and circulation.
As
keyloggers become more advanced, it becomes harder to catch them. The ability to detect every-changing and ever-improving
keylogging methods becomes more difficult all the time.
Keyloggers can violate a computer user’s privacy for months - even years, believe it or not - without being noticed in the least! During that time frame, a
keylogger can collect all kinds of information about the user it is monitoring. The potential for a
keylogger to obtain not only passwords and login names - but credit card numbers, too - is very high.
Also open to Advanced and efficient
keyloggers are:
* bank account details,
* personal contacts,
* business contacts
* an outline of interests (saved from 'Profile' forms)
* web browsing habits
and much, much more.
This collected data can be used to literally steal user’s personal documents, money, or even their identity. A
keylogger might be as simple as
an .exe and a .dll that is placed in a computer and activated upon boot up via an entry in the registry.
More sophisticated
keyloggers, such as the
Perfect Keylogger or
ProBot Activity Monitor have developed a full line of nasty abilities including:
* Undetectable in the process list and invisible in operation
* A kernel
keylogger driver that
captures keystrokes even when the user is logged off
* A remote deployment wizard The ability to create text snapshots of active applications
* The ability to
capture http post data (including log-ins/passwords)
* The ability to
timestamp record workstation usage HTML and text log file export Automatic e-mail log file delivery
All
keyloggers are not used for illegal purposes. A variety of other uses have surfaced for the
keylogger programs that are around.
Here are some positive uses for
Keyloggers:
* They have been used to monitor web sites visited as a means of parental control over children. * They have been actively used to prevent child pornography and avoid children coming in contact with dangerous elements on the web.
* December, 2001, a federal court ruled that the FBI did not need a special wiretap order to place a
keystroke logging device on a suspect’s computer. The judge allowed the FBI to keep details of its
key logging device secret (citing national security concerns). The defendant in the case, Nicodemo Scarfo Jr., indicted for gambling and loan-sharking, used encryption to protect a file on his computer. The FBI used the
keystroke logging device to capture Scarfo’s password and gain access to the needed file.
Thus, now you've gained some details on keyloggers. The only way to keep safe from both types of keyloggers is to
USE GOOD ANTI-VIRUS and
ANTI-MALWARE programs and practice other obvious good internet navigation habits. Don't let your guard down for a minute. Even if you have great
security-ware, you can still get a
keylogger if you're careless.
Scan your computer often with the best
antivirus and
anti-malware products you can get. Update your software, check your
security software homepages often just to check on virus alerts and things that you might not have received a notification about.