Keyloggers are both helpful and risky. Employers may find that it is one of the best tools to monitor their employees. Others may find it absolutely dangerous since it’s easily installed and greatly invisible.
Keyloggers are defined as a tool to monitor a computer’s keyboard activity. They come in different forms, which is what we will talk about today.
Below are the two major types of keyloggers as well as the different forms of each.
1. Software-based keyloggers
Software-based keyloggers are essentially programs that aim to monitor your computer’s operating system. They vary in types and levels of system penetration. One example of which is memory injection software. These are typical Trojan viruses that alter the memory tablet of a system in order to bypass online security. Another example is a form-grabbing based software. This controls the forms submitted online and essentially tracks all the information a users puts in every form.
Software-based keyloggers are more dangerous if there are additional features for each. They can be very hard to detect that’s why it takes a lot to remove them.
2. Hardware-based keyloggers
Compared to a software-based, hardware ones don’t need any installing since they are already within the physical system of the computer.
Keyboard keyloggers are one of the most common examples of hardware-based ones. It monitors the keyboard keys a user presses and then records it secretly. Another example is the acoustics keyloggers. They record the sounds of the keys pressed by every user. Since each sound is unique, it is possible to predict which key it is.
Keyloggers can either be evil or good. Considering there are so many types of keyloggers out there, one should always be very cautious.
So whether you’re installing something or a hardware device is plugged into your computer, better be careful every step of the way.
No comments:
Post a Comment