![]() ![]() How Passwords Stolen Keylogger or Keystroke Logger (cont’d) The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and anexecutablefile (.EXE) that installs the DLL file and triggers it to work. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly asspywareand executed as part of a rootkitor remote administration (RAT)Trojan horse. How Passwords Stolen Keylogger or Keystroke Logger (cont’d) A keylogger program does not require physical access to the user's computer. At a later point in time, the person who installed the keylogger must return and physically remove the device in order to access the information the device has gathered. How Passwords Stolen Keylogger or Keystroke Logger(cont’d) Because the device resembles an ordinary keyboard plug, it is relatively easy for someone who wants to monitor a user's behavior to physically hide such a device "in plain sight." (It also helps that most workstation keyboards plug into the back of the computer.) As the user types, the device collects each keystroke and saves it as text in its own miniature hard drive. As a hardware device, a keylogger is a small battery-sized plug that serves as a connector between the user's keyboard and computer. How Passwords Stolen Keylogger or Keystroke Logger A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |