Top Secret Software
Home
Product Info
Downloads
Buy Now
Support
Clients - Government agencies, businesses, leading organizations and individuals who need to monitor or protect their pcs, network and data trust our software, you can too! See Clients

Search Our Site - If you want to search for software on our site try using Intelligencesearch.com and type any software name or category. All our products are listed there Search Now

Articles and Review - Our articles and software reviews give you up-to-date information on products, services and insider intelligence on the competitive computer and internet security market. Read More

Top Secret Software

The Keylogger Threat

A keylogger can be a highly effective security application, however it can also be a used as a serious infringement on privacy. Read more on how much of a threat a keylogger can be.

ARTICLE
 

Keylogging Programs (keyloggers, key loggers, keystroke loggers, key recorders, key trappers, key capture programs, etc.) also belong to the same group of tools that monitor user activity on the machine level. It records such information as every keystroke, including the system keys. Installing a keylogger onto a PC is a relatively simple procedure; it may be installed like any other software, or it may be installed as a Trojan or Virus.

Keylogging Hardware Device (keystroke recording device, hardware keylogger, etc.) is a tiny hardware device that can be attached in between a keyboard and a computer or built into the keyboard case. It keeps a record of all keystrokes typed on the keyboard. The recording process is totally transparent to the end user. Keylogging Hardware Devices do not require any software on the victim's PC to be able to log all keystrokes (inc. passwords, etc). They may be covertly attached to the victim's PC by a colleague, cleaner, visitor, etc - the PC does not even need to be switched on when the keylogger is plugged in! The keylogger may then be removed at a later time and its contents (recorded keystrokes / passwords, etc) downloaded at the assailant's convenience. The photograph to the right illustrates the simplicity of attaching a keylogger to the victims PC. This is just one make and model, other keyloggers do exist that are even more covert than this example!

Keylogging programs and devices present a serious threat to the security of individual and networked computing systems.

One particularly scary and dangerous feature of all keylogging programs and keylogging hardware devices is recording of computer user's keystrokes for the purpose of monitoring computer activity. While you are typing out your password and credit card details online it is possible a hacker can be recording your every keystroke. So keystroke monitoring feature is main core of any spy software. Without such core feature any spy software is absolutely ineffective and unavailing.

Keylogging Programs and Hardware Devices also walk the fine line between security administration and security breach. As with scanners and sniffers, the question comes down to intent. Some companies use commercial loggers to monitor employees suspected of resource misuse. While most employees might feel this invades their privacy, such monitoring can be useful for capturing of corporate spies. Law enforcement agencies may also use keystroke loggers to gather evidence on suspected criminals. On the other hand, staffers may download freeware keystroke loggers from hacker warez sites to turn the tables and illicitly spy on their boss or coworkers.

Article from PrivacyKeyboard.com

 

RELATED
1 Spy Software
2 More Spy Software

3 Remote Spyware
4 Keyloggers
NEW/UPDATES
This article was updated on Nov. 06/2009 to maintain its relevance to today's current security concerns.
PARTNER

Parental Control Software

 
 
 
Back To Top | Policies | Contact Us
Copyright © 2009 InfoBureau.net Co. All Rights Reserved.