Key Loggers. Morgan, Ashlee, Vadim, John. What Is Key Loggers?.
PowerPoint Slideshow about ' Key Loggers' - vanna
An Image/Link below is provided (as is) to download presentation
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Keystroke logging (often called key logging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.
A key logger program does not require physical access to the user's computer.
It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse.
A key logger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work.
The key logger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
These kinds of keylogger store a file on the hard drive and will send this file out to the program initiator over the internet. You can get a software keylogger from any kind of download, or email attachment.
Software keylogger are extremely difficult to find and most often the best way to find one is to have a professional look at the computer.
How does it infect/become loaded on your computer? In other words, how does a computer become infected by this type of spyware?
A keylogger is a device that is installed on your computer and is used to record passwords, keystrokes and other important information.
If you're smart about your computer and you take those few extra steps out of your way to avoid attracting malicious keylogger, then you'll be a lot better off in the end with your identity and bank accounts safely tucked away.