Presentation is loading. Please wait.

Presentation is loading. Please wait.

Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?

Similar presentations


Presentation on theme: "Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?"— Presentation transcript:

1 Michael McAllister

2 Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided? - What can be done about them? Demonstration - How easy is it to make a key logger? - How are they hidden? Conclusion - Questions

3 Wikipedia: Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

4 Log keystrokes Either saves keystrokes to a text file and/or sends them electronically to the hacker Captures all keystrokes (even mouse clicks) including but not limited to password and personal information

5 10,000 different keyloggers (that have been found and detected) with that number growing everyday. New ways of tracking peoples keystrokes are being implemented everyday, such as hardware key loggers (that attach to the keyboard)

6 -Get a reputable, well known anti-virus /anti-spyware/anti-malware software to protect yourself -Be smart about what you download and where you download it from -Don’t open attachments from people you don’t know/trust

7 -If you suspect your keys are being logged after being on a particular website, tell the authorities -If you think a certain file is a key logger and your anti-virus is not picking it up, submit the virus to the anti-virus company for further analysis, if it really is a key logger it will be added to the database

8 I made this one in about an hour

9

10

11

12 -Given cryptic names that look like microsoft services

13 Literally hidden from view (i.e go into program -> properties -> Tick Hidden Put in hard to reach directories, deep in the system

14


Download ppt "Michael McAllister. Keyloggers - What is a key logger? - What do they do? Security - How prevalent are they in the Computing World? - How are they avoided?"

Similar presentations


Ads by Google