3. 1. What is keylogger? 2. Who use keylogger? 3. Software & Hardware of Keylogger? 4. What is KeyGhostHardware Keylogger? 5. How cyber criminals use Keyloggers? 6.How to protect yourself from Keyloggers?
4.
5. ďśA keyloggeris a computer program or hardware device that records your every key stroke. It records anything and everything you type including your passwords, emails, credit card numbers and etc. Typing every keystroke
ďśSome company's uses keyloggerto track their employee's activity and to monitor the use of the company's computers and Internet by the employees.
ďśKeyloggersnot only capture keystrokes but also mouse clicks, files and folders that are accessed, visited websites, and much more.
8. ď§Parental Control: parents can track what their children do on Internet and can option to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content.
9. ď§Jealous spouses or partner can use a keyloggerto track the actions of there better half on the internet if they suspect them of âvirtual chattingâ.
10. ď§Company Security: using keyloggersto track input of the key words and phrases associated with commercial information which could damage the company (material or otherwise) if disclosed.
12. Advantages:
⢠Invisible to the human eye
⢠Begins to log the moment a computer is turned on ⢠Can send captured data live to anywhere
⢠Captures credit cards, chats, emails, websites
⢠Can activate & record PC camera and audioDisadvantages:
⢠Easy for hacker to steal their victimâs personal info.
⢠Transmission can be intercepted by hackers.
⢠Dangerous to someone who use online cash sites such
as pay for a large amount of money.
13. KeyGhostHeadlines
NEW! KeyGhostSX New compact design. Huge 2,000,000 Keystroke capacity! Store and retrieve approx12 months worth of typing. Patent Pending triple- speed download. Visit the website below for more information on this keylogger ďśThe KeyGhostHardware Keyloggeris a tiny plug-in device that records every keystroke typed on any PC computer
14. Advantage ď§Easy to install a few seconds! Simply plug it in. ď§It records every keystroke, even those typed in the critical period between computer switch on and the operating system being loaded. ď§No software installation is necessary to record or retrieve keystroke.KeyGhostis Software free. ď§It has a capacity of up to 2,000,000 keystrokes. ď§Keyloggerfeatures looping memory so you will never miss the most recent keystrokes. ď§It is very user-friendly keyloggerwhich can be easily used even by those with little computer knowledge. Simply plug the keyloggerdevice into the keyboard cable.
18. Keyloggersare an extremely common tool in cyber criminals. Many cyber criminals will put keyloggerson your computer by hiding them in downloadable files, such as music or games. These keyloggerswill then record things like the web pages you have visited, as well as the user names and passwords for the web pages. By sorting through this information, the owner of the logger can find information like your bank account numbers, access to online billing, and sometimes even your social security number.
19. Preventing keyloggersfrom accessing your information can be difficult. The most effective method of preventing them is to have the proper security software. By using the right anti-virus and anti-spyware programs, you can prevent the majority of keyloggersfrom being able to get into your system. Making sure that your protection is always turned on and sweeps are done regularly is equally important, as criminals are always finding new ways to put these programs on your computer.
20. Most antivirus companies have already added known keyloggersto their databases, making protecting against keyloggersno different from other types of malicious program: install an antivirus product and keep its database up to date, then the product should be configured defaulted setting to ensure protection against most common keyloggers. The chief purpose of keyloggersis to get confidential data (bank card numbers, passwords, etc.). The most logical ways to protect against unknown keyloggersare as follows:
1.using one-time passwords
2.using a system with proactive protection designed to detect keyloggingsoftware
3.using a virtual keyboard.