SlideShare ist ein Scribd-Unternehmen logo
1 von 21
ប្រធានរទស្តីអំពីីៈ
ស្មាជិកប្កុមីៈ
1. What is keylogger? 2. Who use keylogger? 3. Software & Hardware of Keylogger? 4. What is KeyGhostHardware Keylogger? 5. How cyber criminals use Keyloggers? 6.How to protect yourself from Keyloggers?
A keyloggeris a computer program or hardware device that records your every key stroke. It records anything and everything you type including your passwords, emails, credit card numbers and etc. Typing every keystroke 
Some company's uses keyloggerto track their employee's activity and to monitor the use of the company's computers and Internet by the employees. 
Keyloggersnot only capture keystrokes but also mouse clicks, files and folders that are accessed, visited websites, and much more.
Store in notepad
Parental Control: parents can track what their children do on Internet and can option to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content.
Jealous spouses or partner can use a keyloggerto track the actions of there better half on the internet if they suspect them of “virtual chatting”.
Company Security: using keyloggersto track input of the key words and phrases associated with commercial information which could damage the company (material or otherwise) if disclosed.
Law Enforcement:using keyloggerrecords to analyze and track incidents linked to use of personal computer.
Advantages: 
• Invisible to the human eye 
• Begins to log the moment a computer is turned on • Can send captured data live to anywhere 
• Captures credit cards, chats, emails, websites 
• Can activate & record PC camera and audioDisadvantages: 
• Easy for hacker to steal their victim’s personal info. 
• Transmission can be intercepted by hackers. 
• Dangerous to someone who use online cash sites such 
as pay for a large amount of money.
KeyGhostHeadlines 
NEW! KeyGhostSX New compact design. Huge 2,000,000 Keystroke capacity! Store and retrieve approx12 months worth of typing. Patent Pending triple- speed download. Visit the website below for more information on this keylogger The KeyGhostHardware Keyloggeris a tiny plug-in device that records every keystroke typed on any PC computer
Advantage Easy to install a few seconds! Simply plug it in. It records every keystroke, even those typed in the critical period between computer switch on and the operating system being loaded. No software installation is necessary to record or retrieve keystroke.KeyGhostis Software free. It has a capacity of up to 2,000,000 keystrokes. Keyloggerfeatures looping memory so you will never miss the most recent keystrokes. It is very user-friendly keyloggerwhich can be easily used even by those with little computer knowledge. Simply plug the keyloggerdevice into the keyboard cable.
Back of computer 
USB keylogger 
Blowup
Installation Steps
Keyloggersare an extremely common tool in cyber criminals. Many cyber criminals will put keyloggerson your computer by hiding them in downloadable files, such as music or games. These keyloggerswill then record things like the web pages you have visited, as well as the user names and passwords for the web pages. By sorting through this information, the owner of the logger can find information like your bank account numbers, access to online billing, and sometimes even your social security number.
Preventing keyloggersfrom accessing your information can be difficult. The most effective method of preventing them is to have the proper security software. By using the right anti-virus and anti-spyware programs, you can prevent the majority of keyloggersfrom being able to get into your system. Making sure that your protection is always turned on and sweeps are done regularly is equally important, as criminals are always finding new ways to put these programs on your computer.
Most antivirus companies have already added known keyloggersto their databases, making protecting against keyloggersno different from other types of malicious program: install an antivirus product and keep its database up to date, then the product should be configured defaulted setting to ensure protection against most common keyloggers. The chief purpose of keyloggersis to get confidential data (bank card numbers, passwords, etc.). The most logical ways to protect against unknown keyloggersare as follows: 
1.using one-time passwords 
2.using a system with proactive protection designed to detect keyloggingsoftware 
3.using a virtual keyboard.
Understanding Keylogger

Weitere ähnliche Inhalte

Was ist angesagt?

Ethical Hacking
Ethical HackingEthical Hacking
Ethical HackingSanu Subham
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentationSuryansh Srivastava
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timen|u - The Open Security Community
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...Edureka!
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationParab Mishra
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking pptHarsh Kevadia
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTSKS
 
PPT steganography
PPT steganographyPPT steganography
PPT steganographyparvez Sharaf
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking PowerpointRen Tuazon
 

Was ist angesagt? (20)

Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Ethical hacking presentation
Ethical hacking presentationEthical hacking presentation
Ethical hacking presentation
 
Ransomware
RansomwareRansomware
Ransomware
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
KeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long timeKeyLoggers - beating the shit out of keyboard since quite a long time
KeyLoggers - beating the shit out of keyboard since quite a long time
 
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
What is Ethical Hacking? | Ethical Hacking for Beginners | Ethical Hacking Co...
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Session Hijacking ppt
Session Hijacking pptSession Hijacking ppt
Session Hijacking ppt
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Digital signature
Digital signatureDigital signature
Digital signature
 
PPT steganography
PPT steganographyPPT steganography
PPT steganography
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Cryptography
CryptographyCryptography
Cryptography
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical Hacking Powerpoint
Ethical Hacking PowerpointEthical Hacking Powerpoint
Ethical Hacking Powerpoint
 

Andere mochten auch

សារណា
សារណាសារណា
សារណាnhongsim
 
វែបសាយមានប្រយោជន៍
វែបសាយមានប្រយោជន៍វែបសាយមានប្រយោជន៍
វែបសាយមានប្រយោជន៍Chanratha Sorn
 
កិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាលកិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាលkongsochet
 
HRM lesson
HRM lessonHRM lesson
HRM lessonSavoeng
 
អង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេស
អង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេសអង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេស
អង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេសchanvannda
 
Thesis policy
Thesis policyThesis policy
Thesis policykutmdoc
 
Information Security: Fundamental
Information Security: FundamentalInformation Security: Fundamental
Information Security: FundamentalICT Watch
 
Detectando Hardware keylogger
Detectando Hardware keyloggerDetectando Hardware keylogger
Detectando Hardware keyloggerJaime Restrepo
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingDan Morrill
 
How to create project
How to create projectHow to create project
How to create projectBun Hong
 
The success of business online (khmer version)
The success of business online (khmer version)The success of business online (khmer version)
The success of business online (khmer version)Lao Sopheak
 
Prepare Business Plan
Prepare Business Plan Prepare Business Plan
Prepare Business Plan DerlinSela
 
ចំណេះដឹងទូទៅ
ចំណេះដឹងទូទៅចំណេះដឹងទូទៅ
ចំណេះដឹងទូទៅchanvannda
 

Andere mochten auch (15)

សារណា
សារណាសារណា
សារណា
 
វែបសាយមានប្រយោជន៍
វែបសាយមានប្រយោជន៍វែបសាយមានប្រយោជន៍
វែបសាយមានប្រយោជន៍
 
កិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាលកិច្ចការរដ្ឋបាល
កិច្ចការរដ្ឋបាល
 
HRM lesson
HRM lessonHRM lesson
HRM lesson
 
Research method
Research methodResearch method
Research method
 
អង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេស
អង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេសអង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេស
អង់គ្លេស​--_ខ្មែរ ខ្មែរ_អង់គ្លេស ពាក្យបច្ចេកទេស
 
Thesis policy
Thesis policyThesis policy
Thesis policy
 
Information Security: Fundamental
Information Security: FundamentalInformation Security: Fundamental
Information Security: Fundamental
 
Detectando Hardware keylogger
Detectando Hardware keyloggerDetectando Hardware keylogger
Detectando Hardware keylogger
 
Creating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scriptingCreating a keystroke logger in unix shell scripting
Creating a keystroke logger in unix shell scripting
 
Keylogger screenlogger
Keylogger screenloggerKeylogger screenlogger
Keylogger screenlogger
 
How to create project
How to create projectHow to create project
How to create project
 
The success of business online (khmer version)
The success of business online (khmer version)The success of business online (khmer version)
The success of business online (khmer version)
 
Prepare Business Plan
Prepare Business Plan Prepare Business Plan
Prepare Business Plan
 
ចំណេះដឹងទូទៅ
ចំណេះដឹងទូទៅចំណេះដឹងទូទៅ
ចំណេះដឹងទូទៅ
 

Ähnlich wie Understanding Keylogger

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger Abhishek Hirapara
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxdawitTerefe5
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware KashifKhan417
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security riskK. A. M Lutfullah
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityAdeel Younas
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdfw4tgrgdyryfh
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.Khalil Jubran
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key loggerPatel Mit
 
Aiman
AimanAiman
AimanAimanz
 
User security awareness
User security awarenessUser security awareness
User security awarenessK. A. M Lutfullah
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?TechGenie
 
Protect your website
Protect your websiteProtect your website
Protect your websiteMuthu Natarajan
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger GiralFaurel
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalistsShanmugavel Sankaran
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptxFaith Shimba
 

Ähnlich wie Understanding Keylogger (20)

secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Internet security
Internet securityInternet security
Internet security
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
Five habits that might be a cyber security risk
Five habits that might be a cyber security riskFive habits that might be a cyber security risk
Five habits that might be a cyber security risk
 
Antikeylogger
AntikeyloggerAntikeylogger
Antikeylogger
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
cyber security presentation (1).pdf
cyber security presentation (1).pdfcyber security presentation (1).pdf
cyber security presentation (1).pdf
 
10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.10 steps to protecting your computer to the world of internet.
10 steps to protecting your computer to the world of internet.
 
password cracking and Key logger
password cracking and Key loggerpassword cracking and Key logger
password cracking and Key logger
 
Ways to protect From Keyloggers!
Ways to protect From Keyloggers!Ways to protect From Keyloggers!
Ways to protect From Keyloggers!
 
Aiman
AimanAiman
Aiman
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
You think you are safe online. Are You?
You think you are safe online. Are You?You think you are safe online. Are You?
You think you are safe online. Are You?
 
Protect your website
Protect your websiteProtect your website
Protect your website
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Security_Awareness_Primer.pptx
Security_Awareness_Primer.pptxSecurity_Awareness_Primer.pptx
Security_Awareness_Primer.pptx
 

Mehr von Phannarith Ou, G-CISO

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computerPhannarith Ou, G-CISO
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your informationPhannarith Ou, G-CISO
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your websitePhannarith Ou, G-CISO
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Phannarith Ou, G-CISO
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer Phannarith Ou, G-CISO
 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From VirusPhannarith Ou, G-CISO
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006Phannarith Ou, G-CISO
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterprisePhannarith Ou, G-CISO
 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development ProposalPhannarith Ou, G-CISO
 
ូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingPhannarith Ou, G-CISO
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU StudentPhannarith Ou, G-CISO
 

Mehr von Phannarith Ou, G-CISO (20)

3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer3 Security Tips for better security for personal computer
3 Security Tips for better security for personal computer
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Reconnaisance
Reconnaisance Reconnaisance
Reconnaisance
 
Case - How to protect your information
Case - How to protect your informationCase - How to protect your information
Case - How to protect your information
 
Case - How to protect your website
Case - How to protect your websiteCase - How to protect your website
Case - How to protect your website
 
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
 
Internet Security Policy - Khmer
Internet Security Policy - Khmer Internet Security Policy - Khmer
Internet Security Policy - Khmer
 
How to Protect Computer From Virus
How to Protect Computer From VirusHow to Protect Computer From Virus
How to Protect Computer From Virus
 
How to Secure Your WiFi
How to Secure Your WiFiHow to Secure Your WiFi
How to Secure Your WiFi
 
Facebook Security in 3 Ways
Facebook Security in 3 Ways Facebook Security in 3 Ways
Facebook Security in 3 Ways
 
Exchange Server 2003
Exchange Server 2003Exchange Server 2003
Exchange Server 2003
 
Network Security with ISA Server 2006
Network Security with ISA Server 2006Network Security with ISA Server 2006
Network Security with ISA Server 2006
 
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 EnterpriseNetwork Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
 
Secure System Development Proposal
Secure System Development ProposalSecure System Development Proposal
Secure System Development Proposal
 
How to know you was hacked
How to know you was hackedHow to know you was hacked
How to know you was hacked
 
ូUnderstanding DNS Spoofing
ូUnderstanding DNS SpoofingូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
 
Understanding Malware by BBU Student
Understanding Malware by BBU StudentUnderstanding Malware by BBU Student
Understanding Malware by BBU Student
 
Heartbleed vulnerability
Heartbleed vulnerabilityHeartbleed vulnerability
Heartbleed vulnerability
 
P12 r202t8 05-spam
P12 r202t8 05-spamP12 r202t8 05-spam
P12 r202t8 05-spam
 
P12 r202t8 04-d-dos
P12 r202t8 04-d-dosP12 r202t8 04-d-dos
P12 r202t8 04-d-dos
 

KĂźrzlich hochgeladen

Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432motiram463
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxazadalisthp2020i
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...priyasharma62062
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7jayawati511
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Cybersecurity Threats in Financial Services Protection.pptx
Cybersecurity Threats in  Financial Services Protection.pptxCybersecurity Threats in  Financial Services Protection.pptx
Cybersecurity Threats in Financial Services Protection.pptxLumiverse Solutions Pvt Ltd
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfMichael Silva
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...priyasharma62062
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Availabledollysharma2066
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumFinTech Belgium
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...jeffreytingson
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Pooja Nehwal
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...dipikadinghjn ( Why You Choose Us? ) Escorts
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaipriyasharma62062
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationAdnet Communications
 

KĂźrzlich hochgeladen (20)

(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
(INDIRA) Call Girl Srinagar Call Now 8617697112 Srinagar Escorts 24x7
 
Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432
 
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
From Luxury Escort Service Kamathipura : 9352852248 Make on-demand Arrangemen...
 
cost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptxcost-volume-profit analysis.ppt(managerial accounting).pptx
cost-volume-profit analysis.ppt(managerial accounting).pptx
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
(Sexy Sheela) Call Girl Mumbai Call Now 👉9920725232👈 Mumbai Escorts 24x7
 
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
call girls in Sant Nagar (DELHI) 🔝 >༒9953056974 🔝 genuine Escort Service 🔝✔️✔️
 
Cybersecurity Threats in Financial Services Protection.pptx
Cybersecurity Threats in  Financial Services Protection.pptxCybersecurity Threats in  Financial Services Protection.pptx
Cybersecurity Threats in Financial Services Protection.pptx
 
Stock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdfStock Market Brief Deck (Under Pressure).pdf
Stock Market Brief Deck (Under Pressure).pdf
 
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
CBD Belapur Expensive Housewife Call Girls Number-📞📞9833754194 No 1 Vipp HIgh...
 
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
8377087607, Door Step Call Girls In Kalkaji (Locanto) 24/7 Available
 
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
VIP Independent Call Girls in Mira Bhayandar 🌹 9920725232 ( Call Me ) Mumbai ...
 
Webinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech BelgiumWebinar on E-Invoicing for Fintech Belgium
Webinar on E-Invoicing for Fintech Belgium
 
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
(Vedika) Low Rate Call Girls in Pune Call Now 8250077686 Pune Escorts 24x7
 
Business Principles, Tools, and Techniques in Participating in Various Types...
Business Principles, Tools, and Techniques  in Participating in Various Types...Business Principles, Tools, and Techniques  in Participating in Various Types...
Business Principles, Tools, and Techniques in Participating in Various Types...
 
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
Vip Call US 📞 7738631006 ✅Call Girls In Sakinaka ( Mumbai )
 
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
VIP Independent Call Girls in Bandra West 🌹 9920725232 ( Call Me ) Mumbai Esc...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Strategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate PresentationStrategic Resources May 2024 Corporate Presentation
Strategic Resources May 2024 Corporate Presentation
 

Understanding Keylogger

  • 3. 1. What is keylogger? 2. Who use keylogger? 3. Software & Hardware of Keylogger? 4. What is KeyGhostHardware Keylogger? 5. How cyber criminals use Keyloggers? 6.How to protect yourself from Keyloggers?
  • 4.
  • 5. A keyloggeris a computer program or hardware device that records your every key stroke. It records anything and everything you type including your passwords, emails, credit card numbers and etc. Typing every keystroke Some company's uses keyloggerto track their employee's activity and to monitor the use of the company's computers and Internet by the employees. Keyloggersnot only capture keystrokes but also mouse clicks, files and folders that are accessed, visited websites, and much more.
  • 7.
  • 8. Parental Control: parents can track what their children do on Internet and can option to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content.
  • 9. Jealous spouses or partner can use a keyloggerto track the actions of there better half on the internet if they suspect them of “virtual chatting”.
  • 10. Company Security: using keyloggersto track input of the key words and phrases associated with commercial information which could damage the company (material or otherwise) if disclosed.
  • 11. Law Enforcement:using keyloggerrecords to analyze and track incidents linked to use of personal computer.
  • 12. Advantages: • Invisible to the human eye • Begins to log the moment a computer is turned on • Can send captured data live to anywhere • Captures credit cards, chats, emails, websites • Can activate & record PC camera and audioDisadvantages: • Easy for hacker to steal their victim’s personal info. • Transmission can be intercepted by hackers. • Dangerous to someone who use online cash sites such as pay for a large amount of money.
  • 13. KeyGhostHeadlines NEW! KeyGhostSX New compact design. Huge 2,000,000 Keystroke capacity! Store and retrieve approx12 months worth of typing. Patent Pending triple- speed download. Visit the website below for more information on this keylogger The KeyGhostHardware Keyloggeris a tiny plug-in device that records every keystroke typed on any PC computer
  • 14. Advantage Easy to install a few seconds! Simply plug it in. It records every keystroke, even those typed in the critical period between computer switch on and the operating system being loaded. No software installation is necessary to record or retrieve keystroke.KeyGhostis Software free. It has a capacity of up to 2,000,000 keystrokes. Keyloggerfeatures looping memory so you will never miss the most recent keystrokes. It is very user-friendly keyloggerwhich can be easily used even by those with little computer knowledge. Simply plug the keyloggerdevice into the keyboard cable.
  • 15. Back of computer USB keylogger Blowup
  • 16.
  • 18. Keyloggersare an extremely common tool in cyber criminals. Many cyber criminals will put keyloggerson your computer by hiding them in downloadable files, such as music or games. These keyloggerswill then record things like the web pages you have visited, as well as the user names and passwords for the web pages. By sorting through this information, the owner of the logger can find information like your bank account numbers, access to online billing, and sometimes even your social security number.
  • 19. Preventing keyloggersfrom accessing your information can be difficult. The most effective method of preventing them is to have the proper security software. By using the right anti-virus and anti-spyware programs, you can prevent the majority of keyloggersfrom being able to get into your system. Making sure that your protection is always turned on and sweeps are done regularly is equally important, as criminals are always finding new ways to put these programs on your computer.
  • 20. Most antivirus companies have already added known keyloggersto their databases, making protecting against keyloggersno different from other types of malicious program: install an antivirus product and keep its database up to date, then the product should be configured defaulted setting to ensure protection against most common keyloggers. The chief purpose of keyloggersis to get confidential data (bank card numbers, passwords, etc.). The most logical ways to protect against unknown keyloggersare as follows: 1.using one-time passwords 2.using a system with proactive protection designed to detect keyloggingsoftware 3.using a virtual keyboard.