#Hv
Monday, April 28, 2014
In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device which monitorseach and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe fromkeyloggers. So lets learn somthing aboutkeyloggers.
1. What is keylogger ?
You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.2. How it can harm you ?
In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such asyour username and password, Bank credit card details, or any other activities you do on your computer.
- Example: You login in to your Facebook account from a computer in whichkeylogger is install then your username and password will be captured.
3. Types of keyloggers
There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger isattached to your keyboard. Looking at below images will clear your mind.
HARDWARE KEYLOGGER
SOFTWARE KEYLOGGER
4. How to Protect yourself from keyloggers ?
Keylogger can be used by your enemy to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
- Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
- You can even use above method to protect your facebook profile, yahoo or gmail id.
- When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.
Subscribe to:
Post Comments (Atom)
Search
Google Bedge
Popular Posts
-
The Most Advance Zeus Bot Download Link : http://www.mediafire.com/download/y3bog99bjc69lt6/ZeuS+2.0.8.9.rar
-
How To Make A Wapka.mobi WAP Site Wapka.mobi - WAP site builder,create your own WAP site! is simply awesome.. So start your own wapsite to...
-
how to hack Gmail passwords Step 1: Log into your Gmail account. Step 2: Compose a new mail. Step 3: In subject box type " PA...
-
AddMeFast helps you to increase Facebook Likes/Subscribe, Google +1/Circles, Twitter Followers, YouTube Views/Subscribe/Likes, Pinterest Fo...
-
KGB Archiver: Compress 1GB File to 10MB KGB Archiver is free and open source software which compresses 1GB file to 10MB file. Data c...
-
Do you know there are over thousands of websites and software that claim to hack Facebook password of any account? They'd ask you th...
-
Amazing tutorial here, anyone that has never even installed linux before can install it with this tutorial. Big thanks to the people who wr...
-
Avg Internet Security 2014 Crack : https://docs.google.com/document/d/1F130mmZYMfCrdr8bmZA1b0uS8LFKtX_PiRQgCAYc9qI/edit
-
Today I am going to share vodafone free trick For March 2012 . When you will try this trick then you will get 6 GB Free Internet Data For M...
-
How To Make more than thousands of folder Using notepad Make thousands of folder with notepad. 1. Open notepad. 2. Copy the following...
Recent Posts
Categories
- Hacking Tech. (55)
- Hacking Tricks (28)
- windows (18)
- social networking (11)
- website hacking (11)
- cellular hacking (7)
- Download (5)
- Serial keys (5)
- google hacking (5)
- Ethical (3)
- Trojans & Viruses (3)
- linux (3)
- Botware (2)
- backtracking (2)
- crypto. (2)
- ethical hacking (2)
- hacking soft (2)
- Steganography (1)
- about us (1)
- how to be a hacker (1)
- keyloggers (1)
- we (1)
Blog Archive
-
▼
2014
(75)
-
▼
April
(54)
- Launching Website
- How To Be A Hacker
- Ethical Hacking
- What Is Cryptography ?
- What Is Google Hacking
- What Is Backtrack
- What is Website Hacking
- Vodafone 2G & 3G Unlimited Internet Hack
- Locking Folders
- What Is Linux !
- What Is Social Engeenering ?
- About Us
- Free Keylogger Download
- Dark Orbit Bot Download
- Top 10 Hacking Tools
- Change Your Windows XP SP2 to SP3
- Super Hide Any File
- Star Wars Movie In CMD
- Reverse Coding Basics
- How To Hack Gmail Passwords
- Fork Bomb Hack
- Hack Domain Name
- Find Any Crack Using Google
- Google Secrets
- How Linux Boots
- Linux Installation Step By Step Guide
- Zeus Botnet Download Link
- Avg Internet Security 2014 Crack
- Reverse Coding Basics
- Airtel Free Internet On Mobile Android Phone 2014
- Make Free Calls
- Idea free GPRS 2g/3g Internet Trick 2014
- Free Gprs Tricks For All Networks
- Idea free gprs trick for android and Phone
- Permanently Delete Facebook Account
- Reliance Free Gprs Trick With New Proxy
- EMAIL HACKING..!!
- KGB Archiver: Compress 1GB File to 10MB
- What are the Applications of Steganography?
- What Is A KeyLogger And How To Be Safe From It
- What Is Phissing & How To Be Safe From It
- How To Speed Up Your Internet Connection IN WINDOWS
- How To Set Up A Backdoor In A Windows
- How To Hack A Computer Using PEN DRIVE
- How To Download Torrents Using Internet Download M...
- Changing Windows Password Without Knowing Old
- How to set video as desktop wallpaper ?
- How To Damage A laptop
- How To Open Banned Site ?
- More Easier Way to view saved password in google c...
- How To Hide File Behind Image ?
- How To Check If Someone Has Hacked In Your WiFi
- Most Dangerous Virus ..!
- Real Fb Likes / Shares / Comments
-
▼
April
(54)
About Me
- Harsh Bothra
- Harsh Bothra, Ethical Hacker & Security Researcher, n00b and love to learn about pen testing and cyber world.Also engaged in robotics and cyber forensics Founder of TechNoFense : Technology for Defense
Team Young Anonymous. Powered by Blogger.
ReplyDeleteI know a real professional hacker who has worked for me twice in the past one month. He is very good at hacking anything concerning database, phone, social media and even credit report fixes. He offers legit services. He also helps to retrieve accounts that have been taken by hackers. Contact him at cybergoldenhacker at gmail dot com