Wednesday, March 16, 2011

Keylogger, Concept and its Usage

Hi all friend, this time Johan Computer will share some of the things I know about a software called keylogger.

Keylogger (Spy Software) is a hidden program that functioned to monitor any activity using the keyboard keys. Keylogger is closely connected with the theft of passwords. One of the widely used hacking techniques to take over confidential data on someone's computer without the computer owner's consent authority (administrator).

Keylogger, Concept and its Usage
How Keylogger work ???
Keylogger runs in the background (hidden) without the knowledge of the computer owner. Shortly after a keylogger be installed on the computer, the program will run every computer restart and difficult to be detected. Anti-virus sometimes are also unable to detect because the keylogger was not designed in the form of the virus.

If the keylogger has been running, this software will monitor every activity of a keyboard button is pressed, then store it in log form (reports) that can only be seen by people who install the keylogger. Keylogger will display a program or an address that opened situr then any key typed.

Types of keylogger
Based on its use, the keylogger consists of two types. Local keylogger that only work on local computers and remote keylogger, keylogger that can monitor computer in the network.

Keylogger running on the local computer usually consists of only a single program be installed on local computer. This Keylogger will monitor all activities of the keyboard keys are used. Kelemahanya, because this type of keylogger is only used on local computers, the report recorded the button can not be viewed from another computer / remote.

Meanwhile, remote keylogger to monitor other computers in a network. Keylogger This type usually consisting of from two files. Diinstalkan first installer file on the server computer to monitor and second installer files be installed on client computers (the victim's computer.) Method of installing a second file there are several ways. The most popular is using a trojan. So that programs can be installed by itself like a computer virus.

Based on the physical, in addition to the form of software, keylogger is also available in the form of hardware or known by the name of the Hardware Keylogger. This type of keylogger is usually installed in series with the keyboard. Excess Hardware keylogger which is used by many security companies of the world is capable of storing at least 2 billion data typed keystrokes or save memory for 5 years.

Utilization Keylogger
Like most other computer programs. Keylogger was originally used to monitor the client computer in the network. But now widely used keylogger ability to tap other people's computers and steal important information such as your username and password e-mail, login accounts, credit cards, etc..

0 Comments to in Johan Computer

Post a Comment

Twitter Delicious Facebook Digg Stumbleupon Favorites More