Free PC Security

This blog has moved to

  • Archives

  • Our Reviews
    "I can't find a the perfect word to attach to this website's image because it is out of this world. No matter what type of Computer Security System you are interested in, you'll find help and quality content here. The content is awsome, well displayed and well arranged. The menu and speed is excellent. Navigation, Response and Relevance are also the best of the best. I don't even have to mention the Links because i must admit that i have never seen any better. I will let other people say more or invent other words because it really does suit it! Keep doing what you are doing now because you are exactly on the right path! Thanks for sharing! BOOKMARKED!"

    Get your own reviews, free traffic at

    Our Reviews
    "Great initiative. Will be very usefull to many PC users at home and in business."

    Get your own reviews, free traffic at

    Page copy protected against web site content infringement by Copyscape
    Photo Sharing and Video Hosting at Photobucket
    Blogging Den 2

The Advancement of the Keylogger

Posted by cotojo on May 8, 2007

A keylogger is a program that runs in your computer’s
background secretly recording all your keystrokes. Once
your keystrokes are logged, they are hidden away for later
retrieval by the attacker. The attacker then carefully
reviews the information in hopes of finding passwords or
other information that would prove useful to them.  For
example, a keylogger can easily obtain confidential emails
and reveal them to any interested outside party willing to
pay for the information. 

Keyloggers can be either software or hardware based.
Software-based keyloggers are easy to distribute and
infect, but at the same time are more easily detectable.
Hardware-based keyloggers are more complex and harder to
detect.  For all that you know, your keyboard could have a
keylogger chip attached and anything being typed is
recorded into a flash memory sitting inside your keyboard.
Keyloggers have become one of the most powerful
applications used for gathering information in a world
where encrypted traffic is becoming more and more common.

As keyloggers become more advanced, the ability to detect
them becomes more difficult. They can violate a user’s
privacy for months, or even years, without being noticed. 
During that time frame, a keylogger can collect a lot of
information about the user it is monitoring.  A keylogger
can potential obtain not only passwords and log-in names,
but credit card numbers, bank account details, contacts,
interests, web browsing habits, and much more.  All this
collected information can be used to steal user’s personal
documents, money, or even their identity. 

A keylogger might be as simple as an .exe and a .dll that
is placed in a computer and activated upon boot up via an
entry in the registry. Or, the more sophisticated
keyloggers, such as the Perfect Keylogger or ProBot
Activity Monitor have developed a full line of nasty
abilities including:

· Undetectable in the process list and invisible in
· A kernel keylogger driver that captures keystrokes even
  when the user is logged off
· A remote deployment wizard
· The ability to create text snapshots of active
· The ability to capture http post data (including log-
· The ability to timestamp record workstation usage
· HTML and text log file export
· Automatic e-mail log file delivery

All keyloggers are not used for illegal purposes.  A
variety of other uses have surfaced.  Keyloggers have been
used to monitor web sites visited as a means of parental
control over children. They have been actively used to
prevent child pornography and avoid children coming in
contact with dangerous elements on the web.  Additionally,
in December, 2001, a federal court ruled that the FBI did
not need a special wiretap order to place a keystroke
logging device on a suspect’s computer. The judge allowed
the FBI to keep details of its key logging device secret
(citing national security concerns). The defendant in the
case, Nicodemo Scarfo Jr., indicted for gambling and loan-
sharking, used encryption to protect a file on his
computer. The FBI used the keystroke logging device to
capture Scarfo’s password and gain access to the needed file.

Add to Technorati Favorites

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: