all you need to know about a key logger
TRANSCRIPT
What is Key Logger ???
A key logger is a hardware device or a software program that records the real
time activity of a computer user including the keyboard keys they press.
Keyloggers are used in IT organizations to troubleshoot technical
problems with computers and business networks.
Keyloggers can also be used by a family (or business) to monitor the
network usage of people without their direct knowledge.
Finally, malicious individuals may use key loggers on public
computers to steal passwords or credit card information.
It can be used by parents to keep eye on their children's or company owner to
spy on their employs.
How It Can Harm ???
It can be used by your enemy or friend to get sensitive
information such as your username and password, Bank
credit card details, or any other activities you do on your
computer.
Example:-You login in to your Facebook account from a
computer in which key logger is install then your
username and password will be captured.
Types of Key Loggers
Hardware Key Logger.
Software Key Logger.
Various Key Logger Names
Award Key logger Pro 3.2.
Ultimate Keylogger Free.
BlackBox Security Monitor.
Refog Free Keylogger.
Super WinSpy.
Personal Keylogger.
NextGen AntiKeylogger Free.
Romaco Keylogger.
PyKeylogger.
Koom Keylogger.
Heretic Macro.
Keylogger Douglas.
Revealer Keylogger Free Edition.
Step By Step Working of Key Logger
We will now check out how key logger works.
How to do settings of email delivery in key
logger.
Now we will check the Award Key Logger the
best key logger to explain the concept of key
logger.
Screen After Installing Award Key Logger
After Clicking Global Setting of the Award
Key Logger
General Settings
Logging Info Gathering
When to Start up the Key Logger
Data Send to Email
Data Sending
Here we have to setup an SMTP port.
The SMTP port is used for sending email to the
respective email which we have mentioned.
For Example here we have used
The Default port for the SMTP is 25 but the
alternate port is 465.
We have to set SMTP ACCOUNT and SENDER
same email id and password of the email id
concerned.
Mailing Port
Snapshot Recording
Stealth And Invisible ie. Hiding Key Logger
Log Details
Remote Installer
Remote Installation
For remote installation of award key logger you should have to buy the licensed key logger.
The cracked or the patched key logger doesn’t work for the remote installation.
The other method you can use a RAT(Remote Access Torjan) instead of Key logger but the .exe file should be FUD.