Think for a moment about how much confidential data you store on your computer?, your information isn’t safe. A small device plugged in line with your keyboard or a computer software running in your system could let the others gain access to your privacy and confidential data. Perhaps these hardware devices or computer software shouldn’t have been created, but these are here available to everybody. There is a possibility that you are going to watch it now. You need to know what is going on with your computer.
Uses of surveillance software
If you are a parent and your children use the Internet you should use surveillance software to make sure that no inappropriate web content will be opened.
Use a monitoring software to retrieve lost information, if your operative system crash, a power loss happens, your word processor doesn’t respond, etc.
If you are a system administrator and you would like to restrict opened applications and internet sites in a few machines.
Like a business administrator with many employees and you would want to ensure that your employees are not misusing the computer at work.
If you are a spouse who suspects your partner might be having an affair, your health could be at stake.
Perhaps you want to know if somebody is lying, etc. this list could be interminable.
A Keylogger (KeyLogger, Key Logger, or Keystroke Logger) is a small device installed between your keyboard and your computer or also can be a computer program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the interested person.
Types of key loggers:
– Hardware-based: This is independent of the computer operating system, easy installation but also easy to detect (physically), expensive, for example, a hardware key logger with 512KB of memory will save keystrokes typed during four days approximately. A hardware key loggers like this is about $150. It could be found at any moment and disconnected and will only provide you with keystrokes.
– Software-based: A very basic software Key logger normally consists of two files at least:
– An executable file which loads a DLL, sets the hook and saves keystrokes
– A Dynamic Link Library or DLL.
Also in more complex key loggers or monitoring softwares is included one kernel driver to hook the operative system and stay hidden from others softwares like antispyware, antivirus, and especially from any list process.
Of course, a single key logger can’t do more than save keystrokes, but we know that there are more events in our computers that could be monitored: your computer screen, mouse activity, and cursor, instant messages, etc.
The surveillance software or spy software are products that are developed in different countries of the world by hundreds of companies and by individual programmers. These software products embrace, as a rule, absolutely different products, some of them are well known than others. If a surveillance software becomes popular then more antikeyloggers will be able to detect and disable it.
Periodically one good surveillance software should create a new version, with different signatures for files, for staying undetected for antispyware.
If you think that you are going being spied install another monitoring software in the same computer in your office, but never use key loggers for illegal purposes.