What is a Keylogger?

"Keylogger, spread through the network, depends on the system: WIN 9X / NT / 2000 / XP / Vista / Win7. It is a spyware that can record the user's keyboard operations. Hackers can benefit from software with similar functions, such as Grey Pigeon , Record the information entered by the user, thereby stealing the user's MSN, QQ, email, online games, online banking, etc. account and password, as well as other private information, causing losses to the user.

Keylogger

"Keylogger, transmitted through the network, depends on the system: WIN 9X / NT / 2000 / XP / Vista / Win7. It is a recorder that can record the user's keyboard operation
The appearance of the "Keylogger" is similar to that of an ordinary U disk, except that one end has a USB socket and the other end has a USB interface. During installation, one end is plugged into the USB interface of the computer's main box, and the other end is connected with a USB keyboard.
Generally, when the USB interface of the computer is connected to new hardware, the system will prompt you, but when you insert the "keyboard recorder", the computer system does not have any prompts. [1]
Basic precautions
Important information is entered with the soft keyboard or with the keyboard
Special prevention
QQ login information prevention:
Reduce the input of QQ account passwords on the PC side. Tencent Mobile Phone Pioneer Pioneer released and launched the QQ "secure login" function, which can avoid entering account passwords on the PC, thereby preventing number theft. [1]
"Keylogger Night Edition" virus: vigilance level , spyware, spread through the network, dependent system: WIN 9X / NT / 2000 / XP / Vista / Win7.
It is a spyware that can record user keyboard operations. Hackers can use this software to record the information entered by the user, thereby stealing the user's MSN, QQ, email, online games, online banking, and other account numbers and passwords, as well as other private information, causing losses to users.
Anti-virus experts recommend that computer users take the following measures to prevent the virus: establish good security habits, do not open suspicious emails and suspicious websites; turn off or delete unnecessary services in the system; many viruses use vulnerabilities to spread, be sure to patch the system in a timely manner ; Install professional anti-virus software for real-time monitoring, and always turn on the real-time monitoring function of anti-virus software when you are online.
This software is completely different from a virus. It is a regular software. There are about two types at present: one is imitation operation, and the purpose is to repeat operation.
Button wizards are one of them; another is software for home monitoring.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?