Key loggers also known as keystroke loggers, may be defined as the recording of the key pressed on a system and saved it to a file, and the that file is accessed by the person using this malware. Key logger can be software or can be hardware.
Mainly key-loggers are used to steal password or confidential details such as bank information etc. First key-logger was invented in 1970’s and was a hardware key logger and first software key-logger was developed in 1983.
1. Software key-loggers :
Software key-loggers are the computer programs which are developed to steal password from the victims computer. However key loggers are used in IT organizations to troubleshoot technical problems with computers and business networks. Also Microsoft windows 10 also has key-logger installed in it.
It is a malicious script which is installed into a web page, and listens for key to press such as oneKeyUp(). These scripts can be sent by various methods, like sharing through social media, sending as a mail file, or RAT file.
- Form Based Key loggers –
These are key-loggers which activates when a person fills a form online and when click the button submit all the data or the words written is sent via file on a computer. Some key-loggers works as a API in running application it looks like a simple application and whenever a key is pressed it records it.
2. Hardware Key-loggers :
These are not dependent on any software as these are hardware key-loggers. keyboard hardware is a circuit which is attached in a keyboard itself that whenever the key of that keyboard pressed it gets recorded.
- USB keylogger –
There are USB connector key-loggers which has to be connected to a computer and steals the data. Also some circuits are built into a keyboard so no external wire i used or shows on the keyboard.
- Smartphone sensors –
Some cool android tricks are also used as key loggers such as android accelerometer sensor which when placed near to the keyboard can sense the vibrations and the graph then used to convert it to sentences, this technique accuracy is about 80%.
Now a days crackers are using keystroke logging Trojan, it is a malware which is sent to a victims computer to steal the data and login details.
So key-loggers are the software malware or a hardware which is used to steal , or snatch our login details, credentials , bank information and many more.
Some keylogger application used in 2020 are:
1. Kidlogger 2. Best Free Keylogger 3. Windows Keylogger 4. Refog Personal Monitor 5. All In One Keylogger
Prevention from key-loggers :
These are following below-
- Anti-Key-logger –
As the name suggest these are the software which are anti / against key loggers and main task is to detect key-logger from a computer system.
- Anti-Virus –
Many anti-virus software also detect key loggers and delete them from the computer system. These are software anti-software so these can not get rid from the hardware key-loggers.
- Automatic form filler –
This technique can be used by the user to not fill forms on regular bases instead use automatic form filler which will give a shield against key-loggers as keys will not be pressed .
- One-Time-Passwords –
Using OTP’s as password may be safe as every time we login we have to use a new password.
- Patterns or mouse-recognition –
On android devices used pattern as a password of applications and on PC use mouse recognition, mouse program uses mouse gestures instead of stylus.
These techniques are less common but are very helpful against key-loggers.
Don’t stop now and take your learning to the next level. Learn all the important concepts of Data Structures and Algorithms with the help of the most trusted course: DSA Self Paced. Become industry ready at a student-friendly price.
- Introduction and IPv4 Datagram Header
- Introduction of Classful IP Addressing
- Introduction of Firewall in Computer Network
- Introduction of MAC Address in Computer Network
- Introduction of Mobile Ad hoc Network (MANET)
- Cryptography Introduction
- Introduction of Internetworking
- Introduction of Virtual Router Redundancy Protocol (VRRP) and its configuration
- Introduction to Crypto-terminologies
- Introduction of Active Directory Domain Services
- Introduction of Variable Length Subnet Mask (VLSM)
- Introduction of a Router
- Introduction to Sniffers
- Introduction to basic Networking terminology
- Introduction To Subnetting
- Introduction of Botnet in Computer Networks
- Introduction to SSH(Secure Shell) Keys
- Introduction of ZigBee
- Introduction of Radio Frequency Identification (RFID)
- Introduction of Server
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to email@example.com. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below.