Key Logging
Key Logging
Key logging.
Contents
What is
keylogging? of
Different types
keylogging
Countermeasures
Conclusion
Key logging.
Keystroke logging
Key-logger is a surreptitious surveillance application, which is used to keep record of user's activities on the computer. Key logging is the capture of typed characters. Key logging has both lawful and unlawful applications.
Key logging.
Key logging.
Key logging.
Key logging.
The text saved in the log of the keylogger and the various types of keylogging devices.
Key logging.
Key logging.
Technical countermeasures
Code signing
Code signing is the process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted.
AntiAnti-spyware
Spyware is a type of malware that is installed on computer and collects little bits information at a time about users without their knowledge. Anti-spyware applications are able to detect many keyloggers and cleanse them. Responsible vendors who monitor software support, detect keyloggers by anti-spyware programs, thus preventing the abuse of the software.
Key logging.
10
Firewall
Frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets Enabling a firewall does not stop keyloggers , but can prevent the remote installation of key logging software, and possibly prevent transmission of the logged material over the internet if properly configured.
Key logging.
11
Form fillers are primarily designed for web browsers to fill in checkout pages and log users into their accounts. Once the user's smart card information has been entered into the program, it will be automatically entered into forms without ever using the keyboard or clipboard, thereby reducing the possibility that private data is being recorded.
Using one-time passwords is completely keylogger-safe because the recorded password is always invalidated as soon as it's used. One example is online banking.
Key logging.
12
WebWeb-based keyboards
Keyboard image is displayed with all its keys on the screen. User presses the keys by clicking with a mouse. Some commercial key logging programs do not record typing on a web-based virtual keyboard.
Key logging.
13
Key logging.
14
Key logging.
15
AntiAnti-keylogging software
It will disable this hook mechanism so the text will never reach the key logger program. Consequently, it will break some other programs that rely on this hook mechanism. Keylogger detection software is also available. Some of this type of software use "signatures" from a list of all known keyloggers. It provides a hotkey combination to quickly disable or enable typing protection. Speech-to-text conversion software can also be used against keyloggers, since there are no typing or mouse movements involved.
Speech recognition
Key logging.
16
NonNon-technological methods
Some keyloggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window. Similarly, a user can move their cursor using the mouse during typing, causing the logged keystrokes to be in the wrong order e.g. by typing a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter. Another very similar technique utilizes the fact that any selected text portion is replaced by the next key typed. E.g. if the password is COMPUTER", one could type C", then some dummy keys pqrs". Then these dummies could be selected with mouse, and next character from the password O" is typed, which replaces the dummies pqrs".
Key logging.
17
Conclusion.
A keylogger
is a type of software that is used for keystroke logging, which is the practice of monitoring the keys that are punched on a computer keyboard. Keylogging is often done for nefarious purposes, like stealing passwords and banking information. Antispyware programs, firewalls, network monitors and automatic form filler programs can all be used as protection against keylogging programs.
Key logging.
18
THANK YOU
Key logging. 19