Tips and Tricks

Tips and Tricks

Get to know everything you will ever need to optimize your system and enhance your web experience. The tips and tricks will let you explore the tech world in a new way

Read More
Impedit quo minus id

Social Networking

Know more about the social sites you visit everyday. Things you should know with these sites

Read More
Tech News

Tech News

At hacking duo we keep you updated with the recent turnouts in the techno world. The space contains all the new advancement in the Tech world, new releases, reviews etc

Read More
Operating System

Operating system

You own Window, Linux or Mac, we will always have something for you. All tips and hacks that you will need to play with your system

Read More
  • Quas molestias excepturi
  • Impedit quo minus id
  • Tech News
  • Mauris euismod rhoncus tortor
Showing posts with label keylogger. Show all posts
Showing posts with label keylogger. Show all posts

Saturday, 8 October 2011

Keylogger is a spying software, it is used to monitor a given system. It records all the commands and typed activities on a given computer which is installed with a keylogger.
keyloggers are installed on a device to create a server program that would store all the keystroke records and will save them for you.
Keyloggers can be of different types such as surviliance keylogger and remote keylogger.
Surviliance keylogger is installed on the system to recordd and track the activity of company empolyes, spouse or tracking the online records of your children.

Remote keylogger is used mainly for hacking works, its considered to be one of the best hacking tools available now a days. But most of the keyloggers are detectable by anti-viruses and can be cleaned by the run-time scanning of anti-virus. so. hackers use different methods to hide the keyloggers. Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

So, I think your doubt about keyloggers are resolved. If you still have any doubt feel free to ask in comments.