Friday, November 26, 2010

KEY LOGGER



  • What is Key Logger?
Keystroke Logger or Key Logger is an application for tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.






  • Software-based keyloggers:
Keylogger surveillance software has the capability to record keystroke/captures Screen Shots and save it to a log file (usually encrypted) for future use. Captures every key pressed on the computer viewed by the unauthorized user. Key logger software can record instant messages, e-mail and any information you type at any time on your keyboard. The log file created by the key logger can then be saved to a specific location or mailed to the concerned person. The software will also record any e-mail address you use and Website URLs visited by you.


  • Why you need Key Logger?
Have you ever questioned what your spouse, kids or employees have been doing on the computer? Is your child misusing the internet facility and taking secret chat with the stranger? Are your employees mailing your business data to your competitors? If you wonder how to tackle these serious issues, you need our key logger software.

The key logger product allows you to secretly monitor and record user's activities and captures Screen shots on the computer PCs. With this software, you will be able to see exactly what people have been doing online and offline, including e-mails, websites visited, applications executed, and keystrokes including username-password, online conversations (G-mail, MSN, Hotmail, Yahoo Messenger etc.) and other similar activities. This tool can run in a stealth mode and is password protected, so no one except you is aware of their existence and the password safeguards other people from uninstalling it.
  • Key Logger features:
1. Key Stroke Recording:

Record all typed keystrokes by the users on computer!

2. Hidden Installation:

Users can not detect about the key logger installation on the computer!

3. Stealth Mode:

Key Logger will not appear on the Desktop, Add/Remove Programs, Control panel and even hidden in installation path folders.

4. Screen-Shot Monitoring:

Facilitate to capture entire screen snap-shots periodically so that you can see what was being displayed on computer screen in your absence when other user was working on your machine.

5. Email Log and FTP settings:

Allows receiving log files through email feature or can upload logs via FTP server settings even if you are thousand miles away.

6. Password Protected:

The keylogger software is password protected and prevents the unauthorized users to change its configuration setting.
  • Hardware-based keyloggers:
Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.


Hardware keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboard and the computer, typically inline with the keyboard's cable connector.

A hardware keylogger has an advantage over a software solution: it is not dependent on being installed on the target computer's operating system and therefore will not interfere with any program running on the target machine.

Download: I've tested approx 50 Keyloggers... I found KIDLOGGER which works fine and is fully undetectable by any Anti-virus software...



  • Protection :
1. Check the Task Manager. Examine all the Applications, Processes & Services running.

2. Use the system configuration utility (msconfig) to determine which task are loaded at start-up.

3. Install a good anti-spyware program in your system like SUPERAntiSpyware and scan your system regularly.

4. KeyScrambler is a program which encrypts your keystrokes to defeat known and unknown keyloggers.

Download: Click here to download KeyScrambler.



Happy Hacking...Enjoy...

For educational purpose only...Do not misuse it...

3 comments:

  1. It has always been interesting to know Hacking related info from U..!!
    keep it up..

    ReplyDelete
  2. @ Gautam

    Thanks yaar... It is only the support 4m u guys which keeps me motivated all the time... Keep watchin :-)

    ReplyDelete
  3. It's the best time to make some plans for the future and it is time to be happy.

    I've read this post and if I could I wish to suggest
    you some interesting things or suggestions. Perhaps you can
    write next articles referring to this article. I desire to read more things about it!



    my web page - cityville game ()

    ReplyDelete

If you like this post, comment please...