Thursday, September 22, 2011

how to protect your computer from key loggers


lets start from basics

What is Keylogger?
Keylogger is basically a software tool which clones your key strokes pressed and writes them into log files. Some smart or simply say advanced keyloggers are retrieves the saved passwords in web browsers and other windows applications. Hackers use keyloggers to hack users email account passwords and other passwords and monitor their day to day activity.
How the Keylogger Works?
Lets explain this in very simple way, Whenever you press any key on your keyboard or laptop your machine generates a simple key code which depends on the keyboard format you are using. That key code tell your operating system that you have pressed a particular key. Now what keylogger does it save your key stroke into a file. Now further processing depends upon type of Keyloggers. Basically there are two types of keyloggers:
1. Physical keylogger
2. Remote Keylogger
The above processing is same for both physical and remote keyloggers. The difference lies in how they are gonna use a log file.
Physical keyloggers requires physical access to a victim's system, so that hacker can install it manually. He may be your friend, brother, sister or some close one who actually has physical access to your PC or laptop. Now for getting logs also he has to manually access your PC to check logs. But nowadays few good physical keyloggers are there which sends logs on email address. So nowadays we only need one time Physical access and that's just to install Keylogger and configure an email address to send logs.
Remote keyloggers are a bit different as there name suggest they can be installed from remote, means you don't need any physical access. Remote keyloggers during configuration generates a server that we can send to victim and which does not need any installation. Remote keylogger maintains the records into log files and when victim connects to internet it send the logs to hacker's email address or FTP account that he has putted during configuration time to receive logs.
There are lot many solutions available on web but most easy one is a software called keycrambler
it is important to know how it works
The Crucial Path in the Operating System
When you try do something online, for example access your checking account on your bank's website, your keystrokes will travel along a path in the operating system to reach the destination application. Many places along this path, malware can be physically or remotely planted by cyber criminals to intercept your keystrokes so they can steal your user name and password, which is why keystroke logging (keylogging) poses such a serious threat and is a thorny problem to solve.

KeyScrambler secures your keystroke data through the crucial path. How does it work?

  1. As you're typing on the keyboard, KeyScrambler is simultaneously encrypting your keystrokes at the keyboard driver level. Because KeyScrambler is located in the kernel, deep in the operating system, it is difficult for keyloggers to bypass the encryption.
  2. As the encrypted keystrokes travel along the crucial path, it doesn't matter if they get logged, or whether the keyloggers are known or brand new, because your keystrokes are completely indecipherable the whole time.
  3. When the encrypted keystrokes finally arrive at the destination app, the decryption component of KeyScrambler goes to work, and you see exactly the keys you've typed

    KeyScrambler uses both standard symmetric-key and asymmetric-key encryption. The algorithm used for symmetric-key encryption is Blowfish (128-bit). The algorithm for asymmetric-key is RSA (1024-bit).
    you can download a free version from
http://www.keyscrambler.com/download.htm






glarysoft a perfect computer utility


glarysoft is a software company which provides all in one utilities for your pc.It is most efficient to use and alsio very nice GUI.most important is it is completely free.it is also compatible with windows 7.
it provides sojme of features like
1)registry cleaner
2)temporary file cleaner
3)spyware remover
4) start up mnanager
5)optimize and improve
6)privacy and security........................
what not it is a complete package

it is mostly recommended by software professionals.If you like the software then just buy the software and support glary soft ltd.