Anti-keylogger

An anti-keylogger (or anti–keystroke logger) is a type of software specifically designed for the detection of keystroke logger software; often, such software will also incorporate the ability to delete or at least immobilize hidden keystroke logger software on a computer. In comparison to most anti-virus or anti-spyware software, the primary difference is that an anti-keylogger does not make a distinction between a legitimate keystroke-logging program and an illegitimate keystroke-logging program (such as malware); all keystroke-logging programs are flagged and optionally removed, whether they appear to be legitimate keystroke-logging software or not. The anti-keylogger is efficient in managing malicious users. It can detect the keyloggers and terminate them from the system.[1]

Use of anti-keyloggers

Keyloggers are sometimes part of malware packages downloaded onto computers without the owners' knowledge. Detecting the presence of a keylogger on a computer can be difficult. So-called anti- keylogging programs have been developed to thwart keylogging systems, and these are often effective when used properly.

Anti-keyloggers are used both by large organizations as well as individuals in order to scan for and remove (or in some cases simply immobilize) keystroke logging software on a computer. It is generally advised the software developers that anti-keylogging scans be run on a regular basis in order to reduce the amount of time during which a keylogger may record keystrokes. For example, if a system is scanned once every three days, there is a maximum of only three days during which a keylogger could be hidden on the system and recording keystrokes.

Public computers

Public computers are extremely susceptible to the installation of keystroke logging software and hardware, and there are documented instances of this occurring.[2] Public computers are particularly susceptible to keyloggers because any number of people can gain access to the machine and install both a hardware keylogger and a software keylogger, either or both of which can be secretly installed in a matter of minutes.[3] Anti-keyloggers are often used on a daily basis to ensure that public computers are not infected with keyloggers, and are safe for public use.

Gaming usage

Keyloggers have been prevalent in the online gaming industry, being used to secretly record a gamer's access credentials, user name and password, when logging into an account; this information is sent back to the hacker. The hacker can sign on later to the account and change the password to the account, thus stealing it.

World of Warcraft has been of particular importance to game hackers and has been the target of numerous keylogging viruses. Anti-keyloggers are used by many World of Warcraft and other gaming community members in order to try to keep their gaming accounts secure.

Financial institutions

Financial institutions have become the target of keyloggers,[4] particularly those institutions which do not use advanced security features such as PIN pads or screen keyboards.[5] Anti-keyloggers are used to run regular scans of any computer on which banking or client information is accessed, protecting passwords, banking information, and credit card numbers from identity thieves.

Personal use

The most common use of an anti-keylogger is by individuals wishing to protect their privacy while using their computer; uses range from protecting financial information used in online banking, any passwords, personal communication, and virtually any other information which may be typed into a computer. Keyloggers are often installed by people known by the computer's owner, and many times have been installed by an ex-partner hoping to spy on their ex-partner's activities, particularly chat.[6]

Types

Signature-based

This type of software has a signature base, that is strategic information that helps to uniquely identify a keylogger, and the list contains as many known keyloggers as possible. Some vendors make some effort or availability of an up-to-date listing for download by customers. Each time a 'System Scan' is run, this software compares the contents of the hard disk drive, item by item, against the list, looking for any matches.

This type of software is a rather widespread one, but it has its own drawbacks The biggest drawback of signature-based anti-keyloggers is that one can only be protected from keyloggers found on the signature-base list, thus staying vulnerable to unknown or unrecognized keyloggers. A criminal can download one of many famous keyloggers, change it just enough, and the anti-keylogger won't recognize it.

Heuristic analysis

This software doesn't use signature bases, it uses a checklist of known features, attributes, and methods that keyloggers are known to use.

It analyzes the methods of work of all the modules in a PC, thus blocking the activity of any module that is similar to the work of keyloggers. Though this method gives better keylogging protection than signature-based anti-keyloggers, it has its own drawbacks. One of them is that this type of software blocks non-keyloggers also. Several 'non-harmful' software modules, either part of the operating system or part of legitimate apps, use processes which keyloggers also use, which can trigger a false positive. Usually all the non signature-based keyloggers have the option to allow the user to unblock selected modules, but this can cause difficulties for inexperienced users who are unable to discern good modules from bad modules when manually choosing to block or unblock.

See also

References

  1. ^ Arora, Twinkle; Sharma, Monika; Khatri, Sunil Kumar (October 2019). "Detection of Cyber Crime on Social Media using Random Forest Algorithm". 2019 2nd International Conference on Power Energy, Environment and Intelligent Control (PEEIC). IEEE. pp. 47–51. doi:10.1109/peeic47157.2019.8976474. ISBN 978-1-7281-1793-5. S2CID 211058018.
  2. ^ "Keyloggers found plugged into library computers". SC Magazine. Retrieved 25 April 2011.
  3. ^ "Anti Keylogging & Public Computers". Archived from the original on 22 May 2011. Retrieved 10 May 2011.
  4. ^ "Cyber threat landscape faced by financial and insurance industry". Dr Kim-Kwang Raymond Choo. Archived from the original on 19 October 2017. Retrieved 21 February 2011.
  5. ^ "Privacy Watch: More Criminals Use Keystroke Loggers". PC World About. Archived from the original on 2021-03-01. Retrieved 2016-02-03.
  6. ^ "Is someone you know spying on you?". USA Today. 4 March 2010. Retrieved 25 April 2011.

Read other articles:

Sardines from Akabane Station in Kita, Tokyo Sardines (pilchards) are a nutrient-rich, small, oily fish widely consumed by humans and as forage fish by larger fish species, seabirds and marine mammals. Sardines are a source of omega-3 fatty acids. Sardines are often served in cans, but can also be eaten grilled, pickled, or smoked when fresh. The term sardine was first used in English during the early 15th century, and may come from the Mediterranean island of Sardinia, around which sardines wer…

Application of engineering principles and design concepts to medicine and biology For the journal known as Biomedical Engineering, see Meditsinskaya Tekhnika. This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find s…

Traditional Korean clothing Not to be confused with Hanfu. HanbokPeople wearing hanbokMaterialDiversePlace of originKoreaIntroducedAt least since Goguryeo period HanbokNorth Korean nameChosŏn'gŭl조선옷Hancha朝鮮옷TranscriptionsRevised RomanizationJoseon-otMcCune–ReischauerChosŏn-otSouth Korean nameHangul한복Hanja韓服TranscriptionsRevised RomanizationHanbokMcCune–ReischauerHanbok The hanbok (Korean: 한복; Hanja: 韓服; lit. Korean dress) is a tra…

Pour les articles homonymes, voir Robinson et Le Plessis. Le Plessis-Robinson Vue générale. Blason Administration Pays France Région Île-de-France Département Hauts-de-Seine Arrondissement Antony Intercommunalité Métropole du Grand ParisEPT Vallée Sud Grand Paris Maire Mandat Philippe Pemezec 2023-2026 Code postal 92350 Code commune 92060 Démographie Gentilé Robinsonnais Populationmunicipale 29 228 hab. (2021 ) Densité 8 521 hab./km2 Géographie Coordonnées 48°&#…

この項目には、一部のコンピュータや閲覧ソフトで表示できない文字が含まれています(詳細)。 数字の大字(だいじ)は、漢数字の一種。通常用いる単純な字形の漢数字(小字)の代わりに同じ音の別の漢字を用いるものである。 概要 壱万円日本銀行券(「壱」が大字) 弐千円日本銀行券(「弐」が大字) 漢数字には「一」「二」「三」と続く小字と、「壱」「弐」…

Town in JapanMinamiizu 南伊豆町TownCape Irōzaki in Minamiizu FlagSealLocation of Minamiizu in Shizuoka PrefectureMinamiizu Coordinates: 34°39′N 138°52′E / 34.650°N 138.867°E / 34.650; 138.867CountryJapanRegionChūbuTōkaiPrefectureShizuokaDistrictKamoArea • Total110.58 km2 (42.70 sq mi)Population (July 2019) • Total8,231 • Density74/km2 (190/sq mi)Time zoneUTC+9 (Japan Standard Time)Phone …

Theatre in Aberdeen, Scotland For the theatre in Perth, Western Australia, see His Majesty's Theatre, Perth. For the London theatre now known as His Majesty's, see His Majesty's Theatre, London. His Majesty's TheatreAddressRosemount ViaductAberdeenScotlandCoordinates57°08′53″N 2°06′18″W / 57.148°N 2.1049°W / 57.148; -2.1049OwnerAberdeen City CouncilOperatorAberdeen Performing ArtsDesignationCategory A listedTypeRegional producing and receiving theatreCapacity1…

ماونت بليسانت     الإحداثيات 40°58′01″N 91°33′04″W / 40.966944444444°N 91.551111111111°W / 40.966944444444; -91.551111111111   [1] تقسيم إداري  البلد الولايات المتحدة[2][3]  التقسيم الأعلى مقاطعة هنري  عاصمة لـ مقاطعة هنري  خصائص جغرافية  المساحة 22.070279 كيلومتر مربع22.070275…

2005 film by Mike Mitchell Sky HighTheatrical release posterDirected byMike MitchellWritten by Paul Hernandez Bob Schooley Mark McCorkle Produced byAndrew GunnStarring Kelly Preston Michael Angarano Danielle Panabaker Mary Elizabeth Winstead Kurt Russell CinematographyShelly JohnsonEdited byPeter AmundsonMusic byMichael GiacchinoProductioncompanies Walt Disney Pictures Gunn Films Distributed byBuena Vista Pictures DistributionRelease date July 29, 2005 (2005-07-29)[1] Runn…

Pour les articles homonymes, voir Ligne Namboku. Ligne Namboku Tokyo Metro série 9000 sur la ligne Namboku Réseau Métro de Tokyo Terminus MeguroAkabane-Iwabuchi Histoire Mise en service 1991 Exploitant Tokyo Metro Infrastructure Écartement des rails 1067 Électrification 1500 Vcc Exploitation Points d’arrêt 19 Longueur 21,3 km Jours de fonctionnement L, Ma, Me, J, V, S, D Lignes connexes C E G I M S T Y Z modifier  La ligne Namboku (東京地下鉄…

NFL team season 1990 Philadelphia Eagles seasonOwnerNorman BramanHead coachBuddy RyanHome fieldVeterans StadiumResultsRecord10–6Division place2nd NFC EastPlayoff finishLost Wild Card Playoffs(vs. Redskins) 6–20Uniform ← 1989 Eagles seasons 1991 → The 1990 Philadelphia Eagles season was the team's 58th in the National Football League (NFL). The team made the postseason yet again with a 10–6 overall record, despite beginning the season with disappointing early-seas…

1st season of Federation Cup Football league seasonTurkish Federation CupSeason1956–57ChampionsBeşiktaş1st titleEuropean CupBeşiktaşMatches played53Goals scored160 (3.02 per match)Top goalscorerNazmi Bilge (8)Biggest home winKültürspor 8–0 EgesporBiggest away winAnkara Demirspor 0–7 Galatasaray1957–58 → The 1956–57 Turkish Federation Cup was the first professional nationwide football competition in Turkey. The tournament was organized by the Turkish Football Federation (TF…

NGC 2606   الكوكبة الدب الأكبر[1]  رمز الفهرس PGC 24117 (فهرس المجرات الرئيسية)MCG+09-14-072 (فهرس المجرات الموروفولوجي)SDSS J083534.43+524720.0 (مسح سلون الرقمي للسماء)FIRST J083534.4+524720 (Faint Images of the Radio Sky at Twenty-Centimeters)NVSS J083534+524720 (NRAO VLA Sky Survey)Z 263-59 (فهرس المجرات وعناقيد المجرات)2MASX J08353444+5247196 (Two Micron All-Sky S…

Artikel ini bukan mengenai Yio Chu Kang atau Phua Chu Kang. Nama Inggris: Choa Chu Kang Tionghoa: 蔡厝港 (Pinyin: Càicuògǎng) Melayu: Choa Chu Kang Tamil: சுவா சூ காங் Pandangan luar dari wilayah Choa Chu Kang, dengan latar depan Stasiun MRT/LRT Choa Chu Kang, Singapura dan Terminal Pergantian Bus Choa Chu Kang. Choa Chu Kang adalah tempat di Singapura, terletak di bagian barat. Wilayah ini merupakan bagian dari Choa Chu Kang New Town. Fasilitas Pusat perbelanjaan Lejel…

1844 Paris newspaper Not to be confused with the Jewish-American weekly newspaper Forverts (The Forward), or Vorwärts, the main journal of the Social Democratic Party of Germany, or Vorwärts! Vorwärts!, the Nazi-youth song. Vorwärts! front page, 10 June 1844 Vorwärts! (German pronunciation: [ˈfɔʁvɛʁts], Forward!) was a biweekly newspaper published in Paris from January to December 1844.[1][2] The journal was seen as the most radical in contemporary Europe.[3…

Hate crimes committed against Native Americans Part of a series onDiscrimination Forms Institutional Structural Statistical Taste-based Attributes Age Caste Class Dialect Disability Genetic Hair texture Height Language Looks Mental disorder Race / Ethnicity Skin color Scientific racism Rank Sex Sexual orientation Species Size Viewpoint Social Arophobia Acephobia Adultism Anti-albinism Anti-autism Anti-homelessness Anti-drug addicts Anti-intellectualism Anti-intersex Anti-left handedness…

American politician (born 1945) Jane HarmanJane Harman official portrait in 2011President of the Woodrow Wilson International Center for ScholarsIn officeFebruary 28, 2011 – February 28, 2021Preceded byLee HamiltonSucceeded byMark GreenMember of the U.S. House of Representativesfrom California's 36th districtIn officeJanuary 3, 1993 – January 3, 1999Preceded byMel Levine (redistricting)Succeeded bySteven T. KuykendallIn officeJanuary 3, 2001 – Februar…

Disambiguazione – Se stai cercando il sistema di scrittura della lingua greca, vedi Alfabeto della lingua greca antica. Disambiguazione – Se stai cercando alfabeto greco usato nella Spagna di Levante, nel V secolo a.C., vedi Alfabeto greco-iberico. Questa voce o sezione sull'argomento antica Grecia è priva o carente di note e riferimenti bibliografici puntuali. Sebbene vi siano una bibliografia e/o dei collegamenti esterni, manca la contestualizzazione delle fonti con note a piè di pa…

Ruta Provincial 2Autovía Juan Manuel Fangio  Buenos Aires,  Argentina Desde arriba, de izquierda a derecha: Vista de la ruta en Las Armas • La ruta en su paso por el Partido de Chascomús • La Autovía 2 en El Pato • Paso de la ruta por Etcheverry • Cartel de ingreso de Mar del Plata por la Autovía 2 Datos de la rutaNombre coloquial Ruta 2Nombre anterior Ruta Nacional 2Identificador  RP 2 Tipo Ruta provincialLongitud 370 kmAdministraciónConcesionaria AUBA…

A 2007 map of Burkina Faso, including main and secondary roads, major airports, and railroad lines. Transport in Burkina Faso consists primarily of road, air and rail transportation. The World Bank classified country's transportation as underdeveloped but noted that Burkina Faso is a natural geographic transportation hub for West Africa.[1] Highways S. T. M. B. (Service de Transport Mixte Bangrin.) A market during a break in the bus journey from Ouagadougou to Bobo-Dioulasso. Boromo, Bal…