lets start from basics
What is Keylogger?
Keylogger is basically a software tool which clones your key email account passwords and other passwords and monitor their day to day activity. pressed and writes them into log files. Some smart or simply say advanced keyloggers are retrieves the saved passwords in web browsers and other windows applications. Hackers use keyloggers to hack users
How the Keylogger Works?
Lets explain this in very simple way, Whenever you press any key on your keyboard or laptop your machine generates a simple key code which depends on the keyboard format you are using. That key code tell your operating system that you have pressed a particular key. Now what keylogger does it save your key stroke into a file. Now further processing depends upon type of Keyloggers. Basically there are two types of keyloggers:
1. Physical keylogger
2. Remote Keylogger
The above processing is same for both physical and remote keyloggers. The difference lies in how they are gonna use a log file.
Physical keyloggers requires physical access to a victim's system, so that hacker can install it manually. He may be your friend, brother, sister or some close one who actually has physical access to your PC or laptop. Now for getting logs also he has to manually access your PC to check logs. But nowadays physical keyloggers are there which sends logs on email address. So nowadays we only need one time Physical access and that's just to install Keylogger and configure to send logs.
Remote keyloggers are a bit different as there name suggest they can be installed from remote, means you don't need any physical access. Remote keyloggers during configuration generates a server that we can send to victim and which does not need any installation. Remote keylogger maintains the records into log files and when victim connects to internet it send the logs to hacker's email address or FTP account that he has putted during configuration time to receive logs.
There are lot many solutions available on web but most easy one is a software called keycrambler
it is important to know how it works
The Crucial Path in the Operating SystemWhen you try do something online, for example access your checking account on your bank's website, your keystrokes will travel along a path in the operating system to reach the destination application. Many places along this path, malware can be physically or remotely planted by cyber criminals to intercept your keystrokes so they can steal your user name and password, which is why keystroke logging (keylogging) poses such a serious threat and is a thorny problem to solve.
KeyScrambler secures your keystroke data through the crucial path. How does it work?