Announcements:

I am currently writing at Computelogy.com actively and that's why i sort of abandoned my own tech blog. Since i am too busy to be taking care of both sides, i guess this blog will go into hibernation for a very very long time. Regrettable, but then it's hard to come up with new posts & stuffs.

So once again, i am now writing actively at Computelogy. Feel free to visit there and enjoy our latest articles and posts!

October 31, 2008

Online Threats: Keyloggers


Keylogging, also called keystroke logging, is a method of capturing/recording user keystrokes. In short, keyloggers are basically the various tools (legal or not) used to capture or record user keystrokes mostly without the user's consent & knowledge. Keystroke logging can be software/hardware based, and they come in many different types and methods, usually ran through remote connections like in an Internet-based environment.

Illustration on how hackers apply keylogging tactics on their hacking process

Long time ago, before the existence of graphical user interface (GUI), keylogging is one method of which computering experts deal with interacting with their machines. Keylogging basically has lots of function and purpose; from problem analysis to studying how one commnicates with the computer. Sounds as though it's fairly useful, isn't it?

The problem with the world is that there are basically two types of computer users: one with ethical integrity while the other one....well, basically those computer hackers, script kiddies with malicious intent....you don't need me to elaborate further on unethical hackings & identity thefts. While keylogging is as useful as to help employers making sure that their employees doesn't do anything apart from daily jobs with the company's PC, its abilities are also manipulated by unethical users...to steal your username & passwords, credit card numbers, important information etc.
Example of a keylogging software. The opposite of it would be anti-keylogging software


While there are several methods to avoid being "keylogged", the most common protection for normal users is to configure their firewall settings to a higher level of protection & to install antispyware softwares on their computers. Since keylogger is also associated with spying user behavior, antispyware normally offers protection against those. Apart from antispyware software, there are anti-keylogging software which are softwares that warn you based on signatures & heuristics analysis when they think that a software/online program is trying to log your keystrokes, webcam, clipboard content etc. Even though some anti-keylogging software come bundled in with Internet Security software such as Kaspersky Internet Security, most security software still doesn't offer anti-logging protections. In that case, sensitive users often will rely on standalone anti-keylogger software.

Online companies often use an anti-keylogging environment called a secure socket layer (SSL) where users can safely complete their purchase/ transactions with the company. In a secure-socket-layered environment, you can notice that the webpage's hypertext protocol will depict a "https://" instead of "http://", often accompanied with socket symbols somewhere within the windows of your internet browsers. However, that doesn't mean users can let their guard down. Remember: the hackers know more than you do.


Illustration of how a secure socket layered environment looks like

0 opinion:

Review Digital Plexus

I do not know how well this blog is doing unless there are feedbacks. Please do leave a review or two with us on how you think about Digital Plexus, its authors or the qualities of the posts. Good and bad comments are all welcomed, but please avoid posting rude/obscene comments that are not helpful to any of us working on this blog:

Disclaimer:

This blog is dedicated for the benefits of those who seeks experiences, knowledge or information in the computer, IT news, technology and software & hardware area. Digital Plexus cannot control how readers use the information, including any fraudulent conducts, illegal activities or deeds as regard by the law. Therefore, Digital Plexus & its authors shall not be liable to any damages caused by readers who misuse the information provided.

Digital Plexus utilizes information from many sources, including personal experiences of authors. Digital Plexus will never claim credits or ownership rights regarding the information it used in the blog, except for the raw articles posted on the blog - those are original materials written by the authors of Digital Plexus itself after the compilation of various information and/or experiences.

Followers

  © Blogger templates 'Neuronic' by Ourblogtemplates.com 2008

Back to TOP