BY GANESHDEV CHAVHAN
THIRD YEAR COMPUTER ENGINEERING
ROLL NO 20140608
SUPPORTED AND GUIDED BY MR. ROSHAN KOTKONDWAR
SPYWARE AND
KEY-LOGGERS
Dr. Bababsaheb Ambedkar Technological
University, Lonere.
AGENDA
Spyware
1. What is Spyware ?
2. The Beginning ..
3. How to detect ?
4. How to protect ?
5. Advantages and Dis-advantages.
Key-loggers
1. Key-loggers ?
2. Types
3. Example and Uses:
4. Live Demo:
5. How to defend?
What is Spyware ?
Spy- ware =Spying Software
 Basically spyware deals with computers and
internet.
Like spying remotely on someone using there
own computer without their acknowledgement
 "Spyware" is mostly classified into four types: system
monitors, Trojans, adware, and tracking cookies. Spyware is
mostly used for the purposes of tracking and storing Internet
users' movements on the Web and serving up pop-up ads to
Internet users.
THE BEGINNING…
The word 'spyware' was used for the first time publicly in October
1995.
It popped up on Usenet (a distributed Internet discussion system
in which users post e-mail like messages) in an article aimed at
Microsoft's business model.
How To Detect ?
 Loading time of your PC
 Startup Programs
 Auto Homepage Setting
 Pop-ups
?
 Ad-ware
 Survey
 Data gathering
 Parental Control Software
 Ethical Hacking
ADVANTAGES
DIS-ADVANTAGES
 Slower Computer
 Unwanted Data
 Useless and Vulgar Pop-Ups
 Privacy
Key-Logger ?
TYPES
Hardware Based Software Based
Examples and Usage
1. Best Key-logger
2. Actual key-logger
3. Perfect Key-logger
4. Hardware based Key-loggers.
5. MyJad Key-logger and many
How to Defend ?
 Do not use freeware like C-cleaner or any Speedup Software
 Don’t install unwanted application or 3rd Party Applications
 Don’t visit or click on pop-ups
 Always Check startup menu and remove unwanted
Source:
• http://www.softnic.com
• http://www.spy-blog.blogspot.in
• http://www.9dot9.com
Special Thanks to:
• MS-Office and Photoshop
• Freeware's.
Any Questions ?
Spyware and key loggers

Spyware and key loggers

  • 1.
    BY GANESHDEV CHAVHAN THIRDYEAR COMPUTER ENGINEERING ROLL NO 20140608 SUPPORTED AND GUIDED BY MR. ROSHAN KOTKONDWAR SPYWARE AND KEY-LOGGERS Dr. Bababsaheb Ambedkar Technological University, Lonere.
  • 2.
    AGENDA Spyware 1. What isSpyware ? 2. The Beginning .. 3. How to detect ? 4. How to protect ? 5. Advantages and Dis-advantages. Key-loggers 1. Key-loggers ? 2. Types 3. Example and Uses: 4. Live Demo: 5. How to defend?
  • 3.
    What is Spyware? Spy- ware =Spying Software  Basically spyware deals with computers and internet. Like spying remotely on someone using there own computer without their acknowledgement  "Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies. Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users.
  • 4.
    THE BEGINNING… The word'spyware' was used for the first time publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsoft's business model.
  • 5.
    How To Detect?  Loading time of your PC  Startup Programs  Auto Homepage Setting  Pop-ups
  • 6.
  • 7.
     Ad-ware  Survey Data gathering  Parental Control Software  Ethical Hacking ADVANTAGES
  • 8.
    DIS-ADVANTAGES  Slower Computer Unwanted Data  Useless and Vulgar Pop-Ups  Privacy
  • 9.
  • 10.
  • 11.
    Examples and Usage 1.Best Key-logger 2. Actual key-logger 3. Perfect Key-logger 4. Hardware based Key-loggers. 5. MyJad Key-logger and many
  • 12.
    How to Defend?  Do not use freeware like C-cleaner or any Speedup Software  Don’t install unwanted application or 3rd Party Applications  Don’t visit or click on pop-ups  Always Check startup menu and remove unwanted
  • 13.
    Source: • http://www.softnic.com • http://www.spy-blog.blogspot.in •http://www.9dot9.com Special Thanks to: • MS-Office and Photoshop • Freeware's.
  • 14.