SlideShare a Scribd company logo
NETWORK SECURITY
CLASS AEP 06
NGUYEN VAN HOANG – 11520564
TRAN MINH TRI - 10520452
University of Information Technology
Teacher: NGUYEN TUAN NAM
Demo keylogger
Introduction
Spyware is software that aids in gathering information about a person or
organization without their knowledge and that may send such information to
another entity without the consumer's consent, or that asserts control over a
computer without the consumer's knowledge
Spyware is mostly used for the purposes such as: tracking and storing internet
users' movements on the web; gathering info …
Introduction
“Spyware” is mostly classified into four types: system monitors/keyloggers,
trojans, adware, and tracking cookies
Whenever spyware is used for malicious purposes, its presence is typically
hidden from the user and can be difficult to detect. Some spyware, such as
keyloggers, may be installed by the owner of a shared, corporate, or public
computer intentionally in order to monitor users
Introduction
Keylogger is the program that is the action of recording (or logging) the keys
use on a keyboard, typically in a covert manner so that the person using the
keyboard is unaware that their actions are being monitored. Nowaday, when
keylogger has been developed at high level. It can record all images, which is
displayed in the screen by screen-shot or screen-capture, even they can record
the movement of mouse pointer
Introduction
External Keyloggers (hardware)
Hardware based keyloggers use physical tools, either attached to the computer
or designed to look like part of the computer, to covertly record actions taken by
computer users.
When the person who places the keylogger is ready to retrieve the information
recorded, he or she will have to remove the keylogger, like a memory card, and
download the information to their computer, where the log of struck keys can
be viewed
Introduction
Internal Keyloggers (software)
Software based keyloggers use digital code to capture and record the keystrokes
made on a computer without use of physical hardware
The keylogging program is installed on the computer to be monitored like other
programs; either from a CD-ROM or downloaded directly from the internet.
Once installed, the application’s files are hidden deep in a computer’s system so
that the casual computer user will never notice them; and they run without
displaying any signs to the computer user that a covert program is running in
the background
Parts of Keyloggers
Typically, a keylogger program will consist of three main parts:
Control Program: used to coordinate activities, tweak the settings, see
the log file for Keylogger. This section is the most technical part of the
hidden keylogger, usually only able to call by using a special keystroke
combinations.
Hook file, or as a monitor program to record your keystrokes, capture
screen (this is the most important part).
Log file, which full contains / record of what was recorded by hook
Demo Keylogger
Note
“Spyware” is mostly classified into four types: system monitors/keyloggers,
trojans, adware, and tracking cookies
System monitors/keyloggers render serious privacy risks because they secretly
capture and transmit user's personal information, worse still, passwords used in
online transactions
Trojans can be used to obtain sensitive information, install malicious programs,
hijack the computer, or compromise additional computers or networks
Adware tracks the users' online activities on the internet to deliver targeted
pop-up advertisements
Tracking cookies are the uninformed small text files downloaded to a user's
computer that preserves preferences on specific websites

More Related Content

What's hot

Antivirus
AntivirusAntivirus
Antivirusyuvan80
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
Zara Nawaz
 
Computer securety
Computer securetyComputer securety
Computer securety
rushil ahmed
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
Pruthvi Monarch
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
Ranjeta Muniandy
 
Metasploit
MetasploitMetasploit
Metasploit
Parth Sahu
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
Cassidy Lajangang
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer SecurityNicholas Davis
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
shusrusha
 
system Security
system Security system Security
system Security
Gaurav Mishra
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
Priyanka Daimary
 
Voicemail_Protection
Voicemail_ProtectionVoicemail_Protection
Voicemail_ProtectionRon Healy
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
Summerpair77
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)siti zulaikha
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virussumitra22
 
Network security
Network securityNetwork security
Network security
Preethi B
 
Computer Security
Computer SecurityComputer Security
Computer Security
vishal purkuti
 

What's hot (20)

Antivirus
AntivirusAntivirus
Antivirus
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Computer securety
Computer securetyComputer securety
Computer securety
 
Virus and its CounterMeasures -- Pruthvi Monarch
Virus and its CounterMeasures                         -- Pruthvi Monarch Virus and its CounterMeasures                         -- Pruthvi Monarch
Virus and its CounterMeasures -- Pruthvi Monarch
 
Impact of ict on society virus
Impact of ict on society virus Impact of ict on society virus
Impact of ict on society virus
 
Metasploit
MetasploitMetasploit
Metasploit
 
Impact of ict on siocety virus
Impact of ict on siocety virusImpact of ict on siocety virus
Impact of ict on siocety virus
 
BackDoors Seminar
BackDoors SeminarBackDoors Seminar
BackDoors Seminar
 
Desktop Pc Computer Security
Desktop Pc Computer SecurityDesktop Pc Computer Security
Desktop Pc Computer Security
 
Counter Measures Of Virus
Counter Measures Of VirusCounter Measures Of Virus
Counter Measures Of Virus
 
system Security
system Security system Security
system Security
 
Trojan ppt pianca
Trojan ppt piancaTrojan ppt pianca
Trojan ppt pianca
 
Voicemail_Protection
Voicemail_ProtectionVoicemail_Protection
Voicemail_Protection
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Network security
Network securityNetwork security
Network security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 

Viewers also liked

2016.Rita van Driel. artikel SBM
2016.Rita van Driel. artikel SBM2016.Rita van Driel. artikel SBM
2016.Rita van Driel. artikel SBMRita van Driel
 
Common&proper nouns
Common&proper nounsCommon&proper nouns
Common&proper nouns
orncn
 
RAF Resume with Tucson & Letters
RAF Resume with Tucson & LettersRAF Resume with Tucson & Letters
RAF Resume with Tucson & LettersRay Fontaine
 
Substance Abuse Otsego, Michigan
Substance Abuse Otsego, MichiganSubstance Abuse Otsego, Michigan
Substance Abuse Otsego, Michigan
recoveryrestart2
 
Anay Prabhu CV (1) (1) (2)
Anay Prabhu CV (1) (1) (2)Anay Prabhu CV (1) (1) (2)
Anay Prabhu CV (1) (1) (2)Anay Prabhu
 
MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)
MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)
MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)Steve Garske, PhD
 
Commercial Building Plug Load Control with Smart Plugs
Commercial Building Plug Load Control with Smart PlugsCommercial Building Plug Load Control with Smart Plugs
Commercial Building Plug Load Control with Smart Plugs
BOSS Controls
 
Cv raimy conception
Cv raimy conception Cv raimy conception
Cv raimy conception
Raimy Conception
 
Accounting Abdel Mu'ti
Accounting Abdel Mu'tiAccounting Abdel Mu'ti
Accounting Abdel Mu'tiAbed Awad
 
Project 3 residential landscape project march 2015 (1)
Project 3 residential landscape project march 2015 (1)Project 3 residential landscape project march 2015 (1)
Project 3 residential landscape project march 2015 (1)
pigxd123
 
Understanding & Calculating Energy Savings for a BOSS Load Controller
Understanding & Calculating Energy Savings for a BOSS Load ControllerUnderstanding & Calculating Energy Savings for a BOSS Load Controller
Understanding & Calculating Energy Savings for a BOSS Load Controller
BOSS Controls
 

Viewers also liked (11)

2016.Rita van Driel. artikel SBM
2016.Rita van Driel. artikel SBM2016.Rita van Driel. artikel SBM
2016.Rita van Driel. artikel SBM
 
Common&proper nouns
Common&proper nounsCommon&proper nouns
Common&proper nouns
 
RAF Resume with Tucson & Letters
RAF Resume with Tucson & LettersRAF Resume with Tucson & Letters
RAF Resume with Tucson & Letters
 
Substance Abuse Otsego, Michigan
Substance Abuse Otsego, MichiganSubstance Abuse Otsego, Michigan
Substance Abuse Otsego, Michigan
 
Anay Prabhu CV (1) (1) (2)
Anay Prabhu CV (1) (1) (2)Anay Prabhu CV (1) (1) (2)
Anay Prabhu CV (1) (1) (2)
 
MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)
MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)
MScBIT Dissertation-SGarske DRAFT 01-01-05 v7.99.43 (1) (1)
 
Commercial Building Plug Load Control with Smart Plugs
Commercial Building Plug Load Control with Smart PlugsCommercial Building Plug Load Control with Smart Plugs
Commercial Building Plug Load Control with Smart Plugs
 
Cv raimy conception
Cv raimy conception Cv raimy conception
Cv raimy conception
 
Accounting Abdel Mu'ti
Accounting Abdel Mu'tiAccounting Abdel Mu'ti
Accounting Abdel Mu'ti
 
Project 3 residential landscape project march 2015 (1)
Project 3 residential landscape project march 2015 (1)Project 3 residential landscape project march 2015 (1)
Project 3 residential landscape project march 2015 (1)
 
Understanding & Calculating Energy Savings for a BOSS Load Controller
Understanding & Calculating Energy Savings for a BOSS Load ControllerUnderstanding & Calculating Energy Savings for a BOSS Load Controller
Understanding & Calculating Energy Savings for a BOSS Load Controller
 

Similar to Demo

Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
Ankit Mistry
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
SnehithaKurimelli
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
Nikhil Pandit
 
Computer security
Computer securityComputer security
Computer security
INGAMULE SIRAJI
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
ManjuA8
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
Vikas Patel
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
GiralFaurel
 
43 automatic
43 automatic43 automatic
43 automatic
aissmsblogs
 
wiki 1 spyware
wiki 1 spywarewiki 1 spyware
wiki 1 spyware
nuramirah
 
Backdoor
BackdoorBackdoor
Backdoor
phanleson
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
shreyng
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14jemtallon
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
Dushyant Singh
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
dawitTerefe5
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Papertafinley
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
IJERD Editor
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 

Similar to Demo (20)

Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Spyware and rootkit
Spyware and rootkitSpyware and rootkit
Spyware and rootkit
 
Computer security
Computer securityComputer security
Computer security
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Chapter 1 malware analysis primer
Chapter 1 malware analysis primerChapter 1 malware analysis primer
Chapter 1 malware analysis primer
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 
43 automatic
43 automatic43 automatic
43 automatic
 
wiki 1 spyware
wiki 1 spywarewiki 1 spyware
wiki 1 spyware
 
Backdoor
BackdoorBackdoor
Backdoor
 
Final project.ppt
Final project.pptFinal project.ppt
Final project.ppt
 
CISSP Week 14
CISSP Week 14CISSP Week 14
CISSP Week 14
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Keyloggers
KeyloggersKeyloggers
Keyloggers
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Spyware triggering system by particular string value
Spyware triggering system by particular string valueSpyware triggering system by particular string value
Spyware triggering system by particular string value
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 

Recently uploaded

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 

Recently uploaded (20)

Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 

Demo

  • 1. NETWORK SECURITY CLASS AEP 06 NGUYEN VAN HOANG – 11520564 TRAN MINH TRI - 10520452 University of Information Technology Teacher: NGUYEN TUAN NAM
  • 3. Introduction Spyware is software that aids in gathering information about a person or organization without their knowledge and that may send such information to another entity without the consumer's consent, or that asserts control over a computer without the consumer's knowledge Spyware is mostly used for the purposes such as: tracking and storing internet users' movements on the web; gathering info …
  • 4. Introduction “Spyware” is mostly classified into four types: system monitors/keyloggers, trojans, adware, and tracking cookies Whenever spyware is used for malicious purposes, its presence is typically hidden from the user and can be difficult to detect. Some spyware, such as keyloggers, may be installed by the owner of a shared, corporate, or public computer intentionally in order to monitor users
  • 5. Introduction Keylogger is the program that is the action of recording (or logging) the keys use on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. Nowaday, when keylogger has been developed at high level. It can record all images, which is displayed in the screen by screen-shot or screen-capture, even they can record the movement of mouse pointer
  • 6. Introduction External Keyloggers (hardware) Hardware based keyloggers use physical tools, either attached to the computer or designed to look like part of the computer, to covertly record actions taken by computer users. When the person who places the keylogger is ready to retrieve the information recorded, he or she will have to remove the keylogger, like a memory card, and download the information to their computer, where the log of struck keys can be viewed
  • 7.
  • 8. Introduction Internal Keyloggers (software) Software based keyloggers use digital code to capture and record the keystrokes made on a computer without use of physical hardware The keylogging program is installed on the computer to be monitored like other programs; either from a CD-ROM or downloaded directly from the internet. Once installed, the application’s files are hidden deep in a computer’s system so that the casual computer user will never notice them; and they run without displaying any signs to the computer user that a covert program is running in the background
  • 9. Parts of Keyloggers Typically, a keylogger program will consist of three main parts: Control Program: used to coordinate activities, tweak the settings, see the log file for Keylogger. This section is the most technical part of the hidden keylogger, usually only able to call by using a special keystroke combinations. Hook file, or as a monitor program to record your keystrokes, capture screen (this is the most important part). Log file, which full contains / record of what was recorded by hook
  • 11. Note “Spyware” is mostly classified into four types: system monitors/keyloggers, trojans, adware, and tracking cookies System monitors/keyloggers render serious privacy risks because they secretly capture and transmit user's personal information, worse still, passwords used in online transactions Trojans can be used to obtain sensitive information, install malicious programs, hijack the computer, or compromise additional computers or networks Adware tracks the users' online activities on the internet to deliver targeted pop-up advertisements Tracking cookies are the uninformed small text files downloaded to a user's computer that preserves preferences on specific websites