Wednesday 4 September 2013




We use keyboard and mouse to input commands on our computer or direct it to perform a specific task. We point and click through the mouse, while we type in through the keys of the keyboard. The set of keys struck on the keyboard by us while we work on our PC is called keystroke. Logging these keystrokes and keeping their record is an important surveillance activity carried out today. This is referred to as key-logging or keystroke logging.

Certain hardware devices and even software can perform the task of keystroke logging. Hardware devices for this purpose are available as keyboard plugs, which are small in size and serve as connection between keyboard and the computer. Whatever we type in through our keyboard is captured by these hardware keyloggers in their individual miniature hard drives. So, in order to see the keystroke records we need to physically remove these keyloggers and see the gathered keystrokes.

However, keylogger software comprise of programs which use dedicated algorithms to monitor and capture keystrokes. They simply need to be downloaded and installed on a particular computer. Many of them can even be remotely accessed to view the recorded results.

Keylogger utilities and keystroke monitoring are primarily used these days for worthwhile purposes, such as- parental control, employee monitoring, and other computer surveillance activities. But, effective control needs to be established to restrict their usage for malicious purposes, for they are being used for harvesting personal information of innocent users to steal their identity and other financial details.

Many spy-ware utilities and other computer viruses infecting a user's PC have keylogger programs. They are deliberately thrown into the Internet world to infect an unsuspecting computer user, who might mistakenly stumble over them and happen to download them on his/her PC. These programs take advantage of software loopholes in your computer and exploit them to get hold of your closely kept personal or professional data.

0 comments:

Post a Comment