Key Loggers
Keystroke logging or keylogging is the practice of logging the keys struck on a keyboard, typically in a hidden way so that the person using the keyboard is unaware that his/her actions are being monitored. There are numerous keylogging methods, the common two methods are software-based keylogging and hardware-based keylogging.
Remote access software keyloggers
These are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to a monitor at a remote location. Remote communication is facilitated by one of four methods:
• Data is uploaded to a website, database or an FTP account.
• Data is periodically emailed to a pre-defined email address.
• Data is wirelessly transmitted by means of an attached hardware system.
• It allows the monitor to log into the local machine via the internet or ethernet and access the logs stored on the target machine.
Software-based keyloggers
These are software programs that are designed to work on the target computer’s operating system. These are installed in your computer once and then always gives your all information to that person who installed it in your computer. It can be an attachment which you got with your email and unfortunately you download that attachment and launched it in your PC by double clicking. Now your all information like your passwords, your web history, your different screen shots are easily send to that person who gives you that attachment file. And you unaware about his/her activities.
Hardware-based keyloggers
Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system.