Preview

Keylogger

Good Essays
Open Document
Open Document
789 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Keylogger
Chapter I
Design Project Description

Introduction Now in our present situation innovations of lots of devices takes place but reaching only for one goal, to lessen the working time and be more productive for other tasks pending. Since the computer was invented, it really changes the way people handles his everyday work. One of the great innovations in the field of information technology was to develop a software based keyboard logger that enables the user to capture the desired keyboard strokes he entered and later used for quick reference. Since this is only available in software version it needs to run on an installed operating system. Keylogger also belong to the same group of tools that monitor user activity on the machine level. It records such information as every keystroke, including the system keys. Installing a keylogger onto a PC is a relatively simple procedure; it may be installed like any other software. Hardware keylogger is a tiny hardware device that can be attached in between a keyboard and a computer or built into the keyboard case. It keeps a record of all keystrokes typed on the keyboard. The recording process is totally transparent to the end user. Hardware keylogger do not require any software on the user's PC to be able to log all keystrokes (inc. passwords, etc). They may be covertly attached to the user’s PC by anyone, the PC does not even need to be switched on when the keylogger is plugged in. The proponents do only have one goal in mind, but to design a hardware keylogger that doesn’t need any software to function. The user must plug in the device into a host computer and he’s ready to go. No need to neither install device driver nor have an operating system to run. The proponents called the device MCU BASED KEYBOARD LOGGER. It is a microcontroller based keyboard logger that saves any keyboard stroke in its internal memory and later be retrieved to use. No need to memorize again your usernames,

You May Also Find These Documents Helpful

  • Satisfactory Essays

    A computer keyboard is an input device used to enter characters and functions into the computer system by pressing buttons or keys.it is the primary device used to enter text. A keyboard is used to enter text . a keyboard typically contains keys for individual letters, numbers and…

    • 1042 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    CIS 110 Assign 2

    • 551 Words
    • 1 Page

    different types of computers whether its locking your car or relieving an exhausted pilot a…

    • 551 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    ISSC421 Lab 3

    • 414 Words
    • 2 Pages

    You can use the log files to ID malware form the incidence logs. They should tell you when something was downloaded or uploaded to the computer. If you know some minor details about what it is you are looking for then you should be able to ID the malware file that was put on the computer.…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The information in this paper will investigate the elements involved in computer security. Protecting information today requires more than just locking a door or filing cabinet. With data being stored electronically, it is vital that important information be protected from prying eyes. There are many different methods for protecting information that is stored on computers. These methods include everything from password and usernames to biometric devices. There are also software solutions that are used, including antivirus and anti-malware software along with firewalls. All of this is to accomplish the desired…

    • 1544 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    form 1

    • 430 Words
    • 2 Pages

    In the article rushing game hijacking PCs in vast scheme, a criminal gang is using software tools to inject thousands of PCs in a corporate and government networks. The software they used in face PCs with a program known as coreflood which records keystrokes in steel of information this program makes it possible for gang members to see information like bank balances without having to log into stolen accounts.…

    • 430 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The first thing is to introduce a keylogger to a computer. After this, a keylogger keeps the record of all activities you do on your computer. Then it sends it to a malicious server. Keyloggers can be either software or hardware. A hardware keylogger…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Registry analysis is an important step for forensic investigators to collect evidence that supports their case. While running the malicious program, they will leave some traces as other programs which act as an important role to these investigators. The Windows Registry holds a great deal of information about the system such as the settings and configuration of the system.…

    • 676 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Laser Projection Keyboard

    • 267 Words
    • 2 Pages

    A laser projection keyboard was invented and patented by IBM engineer in 1992. It optically detects and analyses human hand and finger motions and interprets them as operations on physically non-existent input device like a surface with painted or project keys. The inventors created this gadget which inspired from the light of laser and they make everything easier by using a little space for placing it on the table. A sensor or camera in the projector pick up fingers movements software converts the coordinates to identify actions or characters. A prominent features is the laser keyboard's size is very small,so you can take it to go to everywhere. Using this gadget is also easy just clear a little space to place it on your table and then you can enjoy working or everything that you want to do with your IPhone and IPad. Moreover this laser projection keyboard is lightweight and easy for taking out.…

    • 267 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Alphanumerical keypad is interfaced to the transmitter to type the data and transmit. The message can be transmitted to multi point receivers. After entering the text, the user can disconnect the keyboard. At any time the user can add or remove or alter the text according to his requirement.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computer Keyboard

    • 531 Words
    • 3 Pages

    There are a few different types of keyboards that provide different functions based on their purpose. The one everyone is most familiar with is the desktop computer keyboard. Generally a desktop computer keyboard contains a little over a hundred keys including keys of the alphabet, digits, and other various function keys. Another type of keyboard we see every day goes by the name of “keypad”. Keypads are small keyboards with a more designated function. Keypads provide input, like in the case of cell phones, they are used to dial numbers or send text messages. Often, keypads have a small amount of keys, resulting in a multi-press system to get the write input. Gaming keyboards include keys which are programmable, in order to be able to have a different function depending on the game. In addition, they have other tasks they can perform relevant to the game as in providing stats or info to help with the game. Lastly, some keyboards are touch screen based and operate by touching the virtual keyboard on the screen of the computer or device itself.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    1. Describe the major components of a computer system and how they work together to solve problems and manipulate data.…

    • 2577 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Input devices: Keyboard, mouse, scanner, digital camera and joystick. Peripheral device used to provide data and control signals to an information processing system such as a computer or other information appliance.…

    • 410 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Digital Prepress WORKFLOW

    • 17867 Words
    • 65 Pages

    circuits which can be turned on and off at a rapid pace. A circuit that…

    • 17867 Words
    • 65 Pages
    Good Essays
  • Good Essays

    operations of computer

    • 445 Words
    • 2 Pages

    Input unit transferred this data into binary coded in short input unit performs the following function:…

    • 445 Words
    • 2 Pages
    Good Essays