What is key logging?

keyboard logging, also known as keylogging, is the practice of recording data to the computer users while using the computer keyboard. This can be done through software or hardware and can be part of a malicious computer program or part of the legitimate security system. Key logging is often considered to be invasion of privacy and can be most devastating when used to obtain important private information, such as account numbers and passwords for bank accounts, credit card information and even online accounts and passwords online. There are a few steps that can be taken to protect computers and users from key logging, and, as with most computer security problems, is careful and the use of computer security software that is the best ways to prevent problems. These devices are connected between the keyboard cord and input on the computer tower and are similar to the size and appearance of the keyboard adapter pluge. Key logging hardware can be particularly difficult, as the information is recorded by the device before it actually gets into the computer, so the computer security software is unnecessary to these types of devices. Fortunately, these devices can usually be seen by an informal computer inspection and should be monitored whenever you use a public computer.

Key logging program can be based on software, and this is usually part of a large computer security or part of a piece of malware (malware). Some people use security software on their computers to ensure that children have access to certain websites or spend money online, or to ensure that employees do not waste your time online at work. Some of these programs may include key logging as features, usually intended to monitor activities with no underage and employmentnci using a computer.

However, some keyboard logging is done by malicious programs such as Trojan horses or other types of malware. These programs are usually designed to record your computer's keyboard when entering account numbers, passwords, and other sensitive information. Data can then be remote access or send to a particular e -mail address or IP address (IP), which is owned by a malware designer. This data can then be used to access accounts and can even be used to change passwords and prevent a legitimate user from accessing its information.

Although some computer security programs can detect these types of harmful protogers by pressing a key, no program is always a perfect defense against such practices. Just as avoid any other malware, computer users should receive every time you open mail from someone they do not know or keep suspicious links in E -mail and the Internet website. Using antiviral and aNtimalware programs and maintaining them constantly updated is also a great way to better detect programs such as key logging, and remove them before the compromise of private information.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?