• Home
  • Archive
  • Tools
  • Contact Us

The Customize Windows

Technology Journal

  • Cloud Computing
  • Computer
  • Digital Photography
  • Windows 7
  • Archive
  • Cloud Computing
  • Virtualization
  • Computer and Internet
  • Digital Photography
  • Android
  • Sysadmin
  • Electronics
  • Big Data
  • Virtualization
  • Downloads
  • Web Development
  • Apple
  • Android
Advertisement
You are here: Home » What are keyloggers, trojans and Backdoors?

By Abhishek Ghosh December 17, 2010 10:56 am Updated on December 17, 2010

What are keyloggers, trojans and Backdoors?

Advertisement

Well, you have set up a system of PGP encryption of your data and your mail  and logically the pass-phrase you use to crack the toughest in the world, is not it ?

 

But be aware that if the authorities (or any other opposition force) really want access to the contents of your encrypted data, there are still few methods available to them. These include the use of keyloggers (= keystroke loggers) equipment or software, trojans and backdoors.

 

Here is a small article explaining the terms Keyloggers, Trojans and Backdoors to an average Microsoft Windows user

 

We start from the premise that the state is interested in your activities to the point of entering your home or computer network to install a keylogger (hardware or software) or backdoor into your computer. Feel free to adapt this scenario to your situation. We felt that this site would not be complete without addressing this issue and the steps to follow to protect your computer system against this type of invasion.

Advertisement

---

 

A physical check of the integrity of your hardware and your software is the most reliable available. This means that if your machine contains important data, you must do everything in your power to ensure the physical security of the computer. Laptops and other PDAs have here the advantage of their size which, unlike a desktop, if not to be constantly on you, at least you can easily make sure they are turned off and unattainable.

 

Keyloggers (Keyloggers = keyboard)

 

The keystroke loggers (keyloggers), which can be hardware or software, their function is to stealthily record everything you type on a computer keyboard, and transmit the data, sometimes by mail or website, the agency or individual who is spying on you. Most keyloggers also record the name of the current application, date and time at which it was executed and the keystrokes associated with that application. The use of keyloggers is increasingly common in the practice of law, and they also enjoy growing popularity among business leaders. Their ability to truly touch by touch record everything typed on a keyboard.

The hardware keyloggers are what they mean, that is; the devices those are connected to your keyboard that records the data. These devices are generally similar to a standard keyboard adapter, and may indeed be difficult to spot if you do not look for specifically. To retrieve the information stored in a hardware keylogger, instigated the surveillance must be accessed again physically. The hardware keyloggers record data locally and generally lack the ability to distribute or to transit in and out via a data network. If you want to see what looks like a hardware keylogger (you will know what to look), look for products KeyKatcher and Key Ghost are the two most popular models on the market. KeyGhost also makes keyboards with integrated keylogger, which makes detection more difficult. Note that because these are features of type material, and KeyKatcher KeyGhost can not be detected by anti-spyware, anti-virus or security of your workstation. In fact, you should check-visually-back of your computer, where the keyboard is connected (even inside the keyboard) to detect the presence of a hardware keylogger. Here is an example photo of hardware keylogger:

Image of hardware keylogger

Software keyloggers are much more common because they can be installed remotely (via a network, through a Trojan or a virus), and thus do not need physical access to the machine to recover data collected (often sending is via email and this, periodically). Unlike their counterparts in hardware, software keyloggers often able to obtain much more data because they are not constrained by the physical size of their memory. Among the hundreds of existing software keyloggers, the best known is ” Invisible KeyLogger Stealth (IKS) in the company Amecisco, or products Spector KeyKey Monitor, 007 STARR, Boss Everywhere and I-See-Ua. Try them if you want to see how they work and the type of data they can provide when installed.

It is common knowledge that the FBI uses keyloggers software and hardware.

For an example of using keylogging software to find information on Magic Lantern, a software developed under the project Carnivore FBI. This is a trojan with a keylogger specially designed for the collection of information on encryption keys and transmit data to the FBI.

 

Detecting Keyloggers

 

The only way to detect hardware keyloggers is to familiarize yourself with these devices and make a full visual inspection of your machine regularly. It may be wise to take pictures of the inside and outside of your computer when you take possession to ensure that everything seems to be in place during your audits.

The fight against software keyloggers can pass by taking a virtual snapshot of the contents of your disk and all file changes made by programs. You must take a new snapshot each virtual software installation or upgrade each of your system to keep it updated. You should also keep this shot outside of your computer and in an undisclosed location so that nobody can change it locally (for physical access to the machine) or remotely. Among the products to achieve this kind of cliche, one finds Snapshot Spy Pro and ArkoSoft System Snapshot (for Windows platforms). fcheck is one of the more trusted to machines running GNU / Linux – we hope someone one can tell us whether this product also runs on OSX platform.

There are also some specialized programs in the detection of keyloggers software. Products Anti-keylogger and SpyCop had good value. These programs are not free but offers an Anti-keylogger trial way you will scan your machine in search of keyloggers. We were unable to fully test these products because we have not acquired the Licenses. Currently to our knowledge, no product specifically detects Magic Lantern.

 

Trojans & Backdoors

 

Another method that could use a spy agency is using a program with a Trojan backdoor. A Trojan is a program seemingly harmless but that contains a dangerous payload, like the Trojan Horse of Greek mythology. In the same way that a virus is often hidden, a Trojan can take on the appearance of a game or any type of executable file (is it necessary to remind you that we should not open the files. Exe and attachments from people you do not know?)

Once executed by the victim, the Trojans put up a backdoor (or so open a breach in system security through a few lines of code, which will then install the backdoor). A backdoor program allows the hacker to access your computer as long as you are connected to the internet. It is a kind of remote, usually very full, which gives access to all files and computer resources.

 

 

It is of course very important not to have a backdoor into their computer. The best protection is through the use of an antivirus program effective and current. For most, they stop the Trojans and backdoors, but if you are permanently connected to the internet you should install a good firewall hardware or software. The firewall is also recommended for dialup users who wish to strengthen their traditional security.

If your computer is behaving strangely and you think you have a backdoor (as if someone had a remote keyboard connected to your machine), manually disconnect your phone line or Internet connection and install a very good antivirus.

 

Software and recommended habits for protection of your Windows 7 PC:

  • Always turn on Windows Firewall
  • Keep Microsoft Windows update to Automatic, however check manually in regular basis.
  • Do not click unknown link and do not download software from untrusted publisher. We recommend not to install so called “tools” developed by individuals, unless you know the developer face to face, physically.
  • Use an real time protection enabled Antivirus: among free options, Microsoft provides Microsoft Security Edition, Avast provides a free home edition too. Among paid options, NOD32 of ESET and Norton Antivirus is very well known and trusted names.
  • Better to use a separate Antimalware. You can try Malwarebytes Antimalware. It has both free and paid version.

Check respected Corrine’s dedicated blog for your computer’s security: SecurityGarden for more details about these softwares.

Signature Tagged With trojan vs backdoor , names of keylogger trojans , keylogger vs backdoor , keylogger through back door , how trojans and backdoor are made , how i can install keylogger and Trojans together , current themes in system hacking trojans and backdoors , backdoors keyloggers , backdoor vs trojan , what is d/f bn playlode keylogger and backdoor

This Article Has Been Shared 772 Times!

Facebook Twitter Pinterest

Abhishek Ghosh

About Abhishek Ghosh

Abhishek Ghosh is a Businessman, Surgeon, Author and Blogger. You can keep touch with him on Twitter - @AbhishekCTRL.

Here’s what we’ve got for you which might like :

Articles Related to What are keyloggers, trojans and Backdoors?

  • Will you use cracked Windows 7?

    Know why using a cracked version of Microsoft Windows 7 is dangerous

  • Cloud Computing : Your Concerns and Thoughts of Richard Stallman

    Cloud Computing as terminology raises the eyebrows of some users who are associated with academics and computing for many years. Let us discuss on the topic.

  • Potential risks users must be aware while using third party themes in Windows 7

    Despite we post many third party theme or Visual Style for Windows 7, we have the responsibility to make Windows 7 users aware of the potential risks associated with their use.

  • How to Share Files and Folders Between Windows and Mac or Linux

    How to Share Files and Folders Between Windows and Mac or Linux ? Normally users uses a router to connect. But you can use Wi-fi, Bluetooth or other cables too.

  • How to ensure your computer’s safety against virus

    The viruses are a threat to any computer across the world. Thus, to reduce our risk of virus infection in Windows operating system based computer, we must not relax our vigilance, we must take steps to ensure that our computers are well protected.

Additionally, performing a search on this website can help you. Also, we have YouTube Videos.

Take The Conversation Further ...

We'd love to know your thoughts on this article.
Meet the Author over on Twitter to join the conversation right now!

If you want to Advertise on our Article or want a Sponsored Article, you are invited to Contact us.

Contact Us

Comments

  1. AvatarJamie says

    January 13, 2011 at 2:58 pm

    Whoever ought to have authored or generated this particular blog ought to be a skilled in this particular region of knowledge.

Subscribe To Our Free Newsletter

Get new posts by email:

Please Confirm the Subscription When Approval Email Will Arrive in Your Email Inbox as Second Step.

Search this website…

 

Popular Articles

Our Homepage is best place to find popular articles!

Here Are Some Good to Read Articles :

  • Cloud Computing Service Models
  • What is Cloud Computing?
  • Cloud Computing and Social Networks in Mobile Space
  • ARM Processor Architecture
  • What Camera Mode to Choose
  • Indispensable MySQL queries for custom fields in WordPress
  • Windows 7 Speech Recognition Scripting Related Tutorials

Social Networks

  • Pinterest (24.3K Followers)
  • Twitter (5.8k Followers)
  • Facebook (5.7k Followers)
  • LinkedIn (3.7k Followers)
  • YouTube (1.3k Followers)
  • GitHub (Repository)
  • GitHub (Gists)
Looking to publish sponsored article on our website?

Contact us

Recent Posts

  • What Online Casinos Have No Deposit Bonus in Australia March 30, 2023
  • Four Foolproof Tips To Never Run Out Of Blog Ideas For Your Website March 28, 2023
  • The Interactive Entertainment Serving as a Tech Proving Ground March 28, 2023
  • Is it Good to Run Apache Web server and MySQL Database on Separate Cloud Servers? March 27, 2023
  • Advantages of Cloud Server Over Dedicated Server for Hosting WordPress March 26, 2023

About This Article

Cite this article as: Abhishek Ghosh, "What are keyloggers, trojans and Backdoors?," in The Customize Windows, December 17, 2010, March 31, 2023, https://thecustomizewindows.com/2010/12/keyloggers-trojans-and-backdoors/.

Source:The Customize Windows, JiMA.in

PC users can consult Corrine Chorney for Security.

Want to know more about us? Read Notability and Mentions & Our Setup.

Copyright © 2023 - The Customize Windows | dESIGNed by The Customize Windows

Copyright  · Privacy Policy  · Advertising Policy  · Terms of Service  · Refund Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT