Skip to main content

Key Loggers-Key stroke logging

Keystroke logging (often called keylogging


It is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. However most key logging programs prohibit downloading from the affected victim due to encryption issues and wireless-to-computer difficulties (unless directly on the victim's computer). There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.

Mainly this software is used to track the ATM pin numbers and Online banking passwords so on.





                                         A Keylogger device connected to the CPU

Wireless keyboard sniffers

These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver. As encryption may be used to secure the wireless communications between the two devices, this may need to be cracked beforehand if the transmissions are to be read.

Acoustic keyloggers

Acoustic cryptanalysis can be used to monitor the sound created by someone typing on a computer. Each key on the keyboard makes a subtly different acoustic signature when stroked. It is then possible to identify which keystroke signature relates to which keyboard character via statistical methods such as frequency analysis. 

Try KEYLOGGER in your PC:

Comments

Popular posts from this blog

Hide your IP address with Proxy servers

The most common method to Hide your IP address is to use a PROXY server. Proxy server is a computer network service that provides an indirect connections between other computer networks. By using this proxy sites we can access any website with out revealing our IP address. This is the best method to keep your IP address secure. Here is the free proxy server website link.  http://www.freeproxyserver.ca/     We need to type the URL of such as (www.facebook.com) in the box given in the site, then we can browse it with out providing our IP address

Future Mouse-Evo Mouse

New evolution of the Mouse. In 1980's round ball mouses are invented, then technology introduced Optical mouses. Now upcoming Mouse is named as Evo mouse . No more movement of your hands on placing a physical mouse,   Your finger is the pointer . You can use this mouse on any Flat Surface and also it requires very little space. This mouse contains a Power button on the top, Mini USb port . It works with the help of bluetooth and input is taken by the sensor. View this Video to know the functionality of   EvoMouse

Control your computer with your voice commands

You can control your PC by using your voice commands Windows7 has an amazing feature, you can say commands that the computer will respond to, and also you can dictate text to the computer. First of all you need to set up your computer for windows speech recognition. There are three steps to setting up Speech Recognition: set up your microphone, learn how to talk to your computer, and train your computer to understand your speech. Before you get started, make sure that your microphone is connected to your computer . Set up your microphone Open Speech Recognition by clicking the  Start  button  , clicking  Control Panel , clicking  Ease of Access , and then clicking  Speech Recognition . Click  Set up microphone . Follow the instructions on the screen. Note The success of speech recognition is directly related to the quality of the microphone you use. The two most common types of microphones for Speech Recogn...