Keyboard CollectorIt is often times necessary to monitor eachkeystroke a user types on your computer. Thiscan be accomplis...
Children need to know that the Internet is a verypublic place and once you write it, there is arecord. Keystrokes are save...
This information can be secretly transmittedto a remote location, it is not necessary tophysical access a user’s computer....
Upcoming SlideShare
Loading in …5
×

Keyboard collector

335 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
335
On SlideShare
0
From Embeds
0
Number of Embeds
21
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Keyboard collector

  1. 1. Keyboard CollectorIt is often times necessary to monitor eachkeystroke a user types on your computer. Thiscan be accomplished in several ways. The firstis to insert a small hardware device behind theback of the computer between the keyboardconnector and computer keyboard port.Because of it’s size and resemblance to anordinary keyboard plug and location ofinstallation a keylogger is mostly undetectable.One can later physically remove the device toaccess the information it has gathered. Let’ssay you have a child that uses the Internet. Itwould be easy to periodically check that theyare using it appropriately
  2. 2. Children need to know that the Internet is a verypublic place and once you write it, there is arecord. Keystrokes are saved as text. Anotherexample would be an employer that needs toknow what’s going on when they aren’t present.Worst case scenario is an attacker that sneaksone in and out and now has access to your bankaccounts, credit card numbers, etc..The second kind of keylogger, softwarekeyloggers, are programs that are downloaded.Often times a software keylogger is unknowinglydownloaded and installed as a Trojan or by avirus. As shown below a software keyloggersilently records all keystrokes, includingpasswords and sensitive information like ahardware keylogger.
  3. 3. This information can be secretly transmittedto a remote location, it is not necessary tophysical access a user’s computer.Keyloggers also hide themselves so that auser cannot easily detect them, Windowstask manager wont show a keyloggerrunning.From a practical sense, having a keylogger inplace, troubleshooting a failure on acomputer might be easier if you havedetailed information on what the user didimmediately prior to the situation.

×