Recent Articles
Beware of Hardware keylogger


Previously i have written some articles about software keyloggers, but hardware keylogger has many advantages over software keyloggers that makes it more popular among the attacks/ hackers. Before telling about advantages here is short description about hardware keyloggers..
http://www.techbyte4u.com/
Hardware key-logger is a tiny device that plugs in between a keyboard and computer, and is a very popular way of capturing and storing keystrokes from keyboard to their internal memory. Hardware keylogger are coming with 512 KB upto 2 GB memory. A 512 KB keylogger can store more than 512000 captured key strokes. It can capture data for 3 month with 8 hours working on computer daily. Can you imagine that how many secret information can be stored if the memory is 2GB.
Advantage of hardware keylogger over Software keylogger:
Share this article to help others from getting hacked.
If you want more information and tutorials about security, check out under category Antivirus and Security.
http://www.techbyte4u.com/
Hardware key-logger is a tiny device that plugs in between a keyboard and computer, and is a very popular way of capturing and storing keystrokes from keyboard to their internal memory. Hardware keylogger are coming with 512 KB upto 2 GB memory. A 512 KB keylogger can store more than 512000 captured key strokes. It can capture data for 3 month with 8 hours working on computer daily. Can you imagine that how many secret information can be stored if the memory is 2GB.
Advantage of hardware keylogger over Software keylogger:
- Hardware keyloggers are not OS dependents, hence can work on any OS.
- It does not interfere with any program running on the target machine and hence cannot be detected by any software, but software keyloggers are mostly detectable by good anti-viruses.
- Software keyloggers can be fooled by sending encrypted or fake keystrokes, but in case of hardware keylogger as it is directly inline with keyboard, so cant send fake keystrokes.http://www.techbyte4u.com/
- Hardware can begin capturing from the moment a computer is turned on and are therefore able to intercept BIOS passwords.
1. PS2
2. USB
Detecting and Defeating Hardware keyloggers:-
Detecting of hardware keylogger is only possible by inspection. If you are using a public computer always check the connection of keyboard connector cable and computer to make sure it is free from any tiny device as shown in picture below.http://www.techbyte4u.com/
But hardware keyloggers cant always detect like this, they can be inbuilt in keyboard, they can be wireless, or they can be hided through any other way so that you cant see them. So you need to be so alert while using a public computer.
Also some hardware keyloggers cant capture correctly Alt+Numpad keystrokes(according to irongeek), so while you type username/ password you can use Alt+Numpad to write. you can check ASCII combos of Alt and numpad keys here.
Share this article to help others from getting hacked.
If you want more information and tutorials about security, check out under category Antivirus and Security.


0 comments for this post
Leave a reply
Subscribe to:
Post Comments (Atom)
TechByte4U on Facebook
Popular Posts
Free winrar, Full version Winrar, Winrar Serial key I guess everyone know what is Winrar, and what it works. So without going into t...
Hey Friends, In my last post i have told you about the browser's fact of storing passwords after prompting 'Do you want t...
In response to query asked by Ameer Hasan Malik Did you forget your windows login password? or want to access Admin account in schoo...
Many people ask me daily "please tell me how to hack any email id". After reading this tutorial all of you will know how to...
Windows Genuine Notifications is a problem that every computer operator faces in her life. It notifies you if a copy of Windows XP is not ge...
Hello friends, Today i am gonna provide you genuine keys for windows 7. People who dont know how to how to make your window genuine by repla...
Google Chrome was one of the first browsers to have multiple processes, which creates a separate process for each tab. That means ...
Hack Google plus I hope till now all of you know what is google plus, so i am not going to write more about Google plus here. If yo...
Have you seen the illusion pictures that ask you to stare on the picture for some seconds and then blink your eyes to see the celebrity? Im...
Through out a day, almost all computer user do many repetitive tasks on computer and internet. If you are one of them, then Macro recor...