From the course: Ethical Hacking: System Hacking

Unlock the full course today

Join today to access over 22,500 courses taught by industry experts or purchase this course individually.

Compare keystroke loggers

Compare keystroke loggers

From the course: Ethical Hacking: System Hacking

Start my 1-month free trial

Compare keystroke loggers

- [Voiceover] Keystroke Loggers record every keystroke made on the system. They come in two different flavors, software and hardware. A software Keylogger will run in the background and record every keystroke. And then stores the results on a hard drive on the system. Work can be later copied or removed by the attacker. Software Keyloggers can be thought of in two different classes. One which is observable in the Task Manager and can be seen. If a Keystroke Logger can be seen in the Task Manager it can be disabled by simply right clicking and selecting end process. Then there are Stealth Keyloggers. These are not easily visible. They're a bit harder to detect. However, they can be found and disabled if the user has administrative privileges. Spyware and malware tools will also most of the time pick up Keyloggers as they are a form of spyware. When setting up a Keylogger some Keyloggers send an email after gathering a predetermined amount of activity. Although this might be a handy…

Contents