The basic function of a Keylogger is to track keyboard keystrokes. This function is usually performed under usually in clandestine conditions whereby the activities on a computer are secretly recorded (logged) for various purposes. A Keylogger is usually meant to do lots of lovely, for example, as part of a corporate surveillance structure. Elements like monitoring & tracking undesirable access to positive restricted sites or unscrupulous means of gaining information from within company networks form a regular part of an essential cyber monitoring mechanism. Various Keylogging methods exist that make it feasible to track & monitor computer activities including hardware as well as application based approaches. Keystroke logging or recording is also feasible over immense physical distances through the use of electromagnetic & acoustic analysis, where the radiation emitted by each keystroke is recorded & analyzed.
The hardware-based Keylogger includes BIOS-level firmware, Keyboard hardware, Wireless keyboard sniffers, Electromagnetic emissions, Keyboard overlays, Acoustic keyloggers, & Optical surveillance.
The way hardware keyloggers work is by means of a hardware circuit mostly attached somewhere in between the computer keyboard & the computer. The keyboard's cable connectors are important for this approach. However, a more robust & covert approach is to put in the hardware inside the keyboard itself for maximum furtiveness. This not only clears the cabling, but also allows for a sturdy way of logging keystrokes. As users start using the keyboard, all keystrokes get recorded to their internal memory, & can further be accessed through some type of command.
The immediate benefit of a hardware-based keylogger is the independence from relying on an operating method (for e.g. Windows OS). This particular approach is undetectable by any application & therefore tends to be reliable in performing surveillance activities. Care ought to of coursework be taken when installing the hardware as it may be fundamentally visible from the outside.
Another way to detect computer activities through Keystrokes is by the use of Wireless Keyboard Sniffers which let you collect knowledge packets that are transferred from a wireless keyboard & its receiver, but this method may require close propinquity with the targeted computer. On the other hand, the electromagnetic emissions generated by a wired keyboard can be recorded from up to0 meters away.
Keyloggers are critical in providing active surveillance to people from varied backgrounds including concerned parents who would like to track their kid's online activities to keep any potential harm at bay, corporate security where the tracking of computer usage can be monitored & tied directly to performance & appraisals, as well as for any potential knowledge breaches, law enforcement & security agencies who can use Keyloggers for defense or national security purposes, & even covetous spouses or partners who tend to often have some type of use for Keyloggers.
It is not the device that is bad. It is the intended use of that device that makes the difference between assurance & abuse. A Keylogger has lots of benefits that can be aligned with any return on investment, whether for an individual or a corporation.
Jumat, 13 Mei 2011
Langganan:
Posting Komentar (Atom)
0 komentar:
Posting Komentar