[ad_1]
Keystroke logging records data entered by a user on a keyboard and can be part of malicious software or a legitimate security system. Hardware keystroke loggers can be particularly problematic. Users should be cautious and use security software to prevent problems. Malicious keystroke loggers can be detected by security programs, but users should also be careful when opening suspicious emails or links.
Keystroke logging, also known as keylogging, is the practice of recording data entered by a computer user while using a computer keyboard. This can be done through software or hardware and can be part of a malicious computer program or part of a legitimate security system. Keystroke logging is often considered an invasion of privacy and can be more devastating when used to obtain important private information, such as account numbers and passwords for bank accounts, credit card information, and even online computer game accounts and passwords . There are several steps that can be taken to protect a computer and user from keystroke logging, and as with most computer security problems, being cautious and using computer security software are the best ways to prevent problems .
Some hardware devices can be used as keystroke loggers. These devices are connected between a keyboard cable and the input on a computer tower and are similar in size and appearance to a keyboard adapter plug. Keystroke logging hardware can be particularly problematic because information is logged by the device before it actually reaches the computer, so computer security software is useless against these types of devices. Fortunately, these devices can usually be seen by a casual inspection of a computer and should be observed whenever a person uses a public computer.
A keystroke logger can be software based and this is usually part of a large computer security system or part of malicious software (malware). Some people use security software on their computers to ensure that children cannot access certain websites or spend money online, or to ensure that employees do not waste time online while at work. Some of these programs may include keystroke logging as a feature, typically intended to track the activities of minors and unsupervised employees using the computer.
Some keystroke logs, however, are run by malicious programs such as Trojan horses or other types of malware. These programs are typically intended to log a computer user’s keystrokes as they enter account numbers, passwords, and other sensitive information. The data can then be accessed remotely or sent to a specific email address or Internet Protocol (IP) address owned by the malware’s designer. This data can then be used to access accounts and can also be used to change passwords and prevent the legitimate user from accessing their information.
While some computer security programs can detect these types of malicious keystroke loggers, no single program is always a perfect defense against such practices. Just like avoiding any other malware, computer users should be careful whenever opening mail from someone they don’t know or following suspicious links in emails and on Internet websites. Using antivirus and antimalware programs and keeping them up to date is also a great way to better detect programs such as keystroke logging malware and remove them before your private information is compromised.
[ad_2]