Recent Articles
Beware of Hardware keylogger
Sunday, November 6, 2011|
Surbhi Verma
Previously i have written some articles about software keyloggers, but hardware keylogger has many advantages over software keyloggers that makes it more popular among the attacks/ hackers. Before telling about advantages here is short description about hardware keyloggers..
http://www.techbyte4u.com/
Hardware key-logger is a tiny device that plugs in between a keyboard and computer, and is a very popular way of capturing and storing keystrokes from keyboard to their internal memory. Hardware keylogger are coming with 512 KB upto 2 GB memory. A 512 KB keylogger can store more than 512000 captured key strokes. It can capture data for 3 month with 8 hours working on computer daily. Can you imagine that how many secret information can be stored if the memory is 2GB.
Advantage of hardware keylogger over Software keylogger:
Share this article to help others from getting hacked.
If you want more information and tutorials about security, check out under category Antivirus and Security.
http://www.techbyte4u.com/
Hardware key-logger is a tiny device that plugs in between a keyboard and computer, and is a very popular way of capturing and storing keystrokes from keyboard to their internal memory. Hardware keylogger are coming with 512 KB upto 2 GB memory. A 512 KB keylogger can store more than 512000 captured key strokes. It can capture data for 3 month with 8 hours working on computer daily. Can you imagine that how many secret information can be stored if the memory is 2GB.
Advantage of hardware keylogger over Software keylogger:
- Hardware keyloggers are not OS dependents, hence can work on any OS.
- It does not interfere with any program running on the target machine and hence cannot be detected by any software, but software keyloggers are mostly detectable by good anti-viruses.
- Software keyloggers can be fooled by sending encrypted or fake keystrokes, but in case of hardware keylogger as it is directly inline with keyboard, so cant send fake keystrokes.http://www.techbyte4u.com/
- Hardware can begin capturing from the moment a computer is turned on and are therefore able to intercept BIOS passwords.
1. PS2
2. USB
Detecting and Defeating Hardware keyloggers:-
Detecting of hardware keylogger is only possible by inspection. If you are using a public computer always check the connection of keyboard connector cable and computer to make sure it is free from any tiny device as shown in picture below.http://www.techbyte4u.com/
But hardware keyloggers cant always detect like this, they can be inbuilt in keyboard, they can be wireless, or they can be hided through any other way so that you cant see them. So you need to be so alert while using a public computer.
Also some hardware keyloggers cant capture correctly Alt+Numpad keystrokes(according to irongeek), so while you type username/ password you can use Alt+Numpad to write. you can check ASCII combos of Alt and numpad keys here.
Share this article to help others from getting hacked.
If you want more information and tutorials about security, check out under category Antivirus and Security.
Posted in
AntiVirus and Tips
0 comments for this post
Leave a reply
Subscribe to:
Post Comments (Atom)
TechByte4U on Facebook
Popular Posts
Hey Friends, Today's Topic will tell you How to access and control a PC remotely..... It happens many times with me that i miss ...
In response to query asked by Ameer Hasan Malik Did you forget your windows login password? or want to access Admin account in schoo...
Keylogger - (keystroke logg i ng) a keylogger is a software used for logging or tracking keystrokes struck on victim's keyboard and sa...
How to inverse colors on a Picture. " Stare at the image then close your eyes, you will see Jesus." When first time I sa...
Hello friends, Today i am gonna provide you genuine keys for windows 7. People who dont know how to how to make your window genuine by repla...
Welcome to the era of trickery, where you may be able to trust your some friends, but can no longer trust their e-mails. Identity theft...
Through out a day, almost all computer user do many repetitive tasks on computer and internet. If you are one of them, then Macro recor...
How to read blackout wikipedia page? Protesting against SOPA and PIPA bills, today Wikipedia has blackout the english version of i...
Check out other posts under category Facebook . Written by: Surbhi Surbhi is Founder of Techbyte4u.com. Follow her on Twi...
Free winrar, Full version Winrar, Winrar Serial key I guess everyone know what is Winrar, and what it works. So without going into t...