The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security.
Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords.
Most modern keyloggers are considered to be legitimate software or hardware and are sold on the open market. Developers and vendors offer a long list of cases in which it would be legal and appropriate to use keyloggers, including:
- Parental control: parents can track what their children do on the Internet, and can opt to be notified if there are any attempts to access websites containing adult or otherwise inappropriate content.
- Jealous spouses or partners can use a keylogger to track the actions of their better half on the Internet if they suspect them of “virtual cheating”.
- Company security: tracking the use of computers for non-work-related purposes, or the use of workstations after hours.
- Company security: using keyloggers to track the input of key words and phrases associated with commercial information which could damage the company (materially or otherwise) if disclosed.
- Other security (e.g. law enforcement): using keylogger records to analyze and track incidents linked to the use of personal computers
Keyloggers spread in much the same way that other malicious programs spread. Excluding cases where keyloggers are purchased and installed by a jealous spouse or partner, and the use of keyloggers by security services, keyloggers are mostly spread using the following methods): a keylogger can be installed when a user opens a file attached to an email; a keylogger can be installed when a file is launched from an open-access directory on a P2P network; a keylogger can be installed via a web page script which exploits a browser vulnerability. The program will automatically be launched when a user visits a infected site; a keylogger can be installed by another malicious program already present on the victim machine, if the program is capable of downloading and installing other malware to the system.
The best ways to avoid them is
- Get the best antivirus software here(not a pirated copy but a legitimate and a legal one! and not a free version too!!!!) Go here
- Don't forget to regularly scan and update it too !
- Use a SECURE BROWSER ! Try mozilla or opera (if your INTERNET is damn slow) BUT NO IE !!!!!!!!!!!!!!!!!! Still 20% of the visitors to my blog use Internet Explorer.
- Use GENUINE SOFTWARES ONLY ! eg Genuine Windows,Genuine Ms. Office,etc
- Install WOT extension to your browser and change your Domain Name Service
The Next two tricks will make you super secure!
- Well if your password is !=!@^${-} Start typing random letters...Select them and overwrite them with your password...So the keylogger will record..things which don't exist in your password ! Because most keyloggers don't track mouse activities like selecting,deselecting,overwriting,replacing...For example it may record !5!%=*!%@!*^*$Thbigi[gkgk{gjh-} (I have underlined the characters in my password :P A keylogger would never do that!).
- You can also write your passwords right to left ! So }-{ $^@!=! will be stored(poor keylogger...fooled!).You can also remix it with the previous trick...So HACKERS!Bad Luck! And yes this trick is MUCH BETTER than the on screen keyboards(See an example)Because some keyloggers are programmed to take screen shots every time you click !
By following these tips you'll stay away from all possible attacks and troubles.....and then NO ONE CAN EVER KEYLOG your activities without your knowledge.
Just like any other tech products, keylogger software is a two-edged sword, it's beyond bad or dangerous, the only point is that how people use it. Personally, I think it's a effective way of parental control.