Marquel World Information Technology

We allready update to new theme & 2 GDesign custom theme coming up. Stay tuned for more updates coming soon By: Admin Kosmyn and the rest of the staff of this support forum

You are not connected. Please login or register

Khing241 How to Protect your PC from keyloggers on Tue Apr 23, 2013 2:37 pm

  • V.I.P

In my previous article i have explained how to detect or find keyloggers in your System or PC. Today i will tell you how to protect your PC or system from these keyloggers. Keyloggers and key stroke monitoring tools
are nowadays becoming a severe problem for internet users. keyloggers
are that much common that you cannot trust any installer that it doesn't
have keylogger in it. So friends today i will tell you tell you how to
protect and secure your PC or Laptop from keyloggers. Well there is no manual way to get rid of Fully undetectable keyloggers
but we can encrypt our keystrokes and make the keystroke logs encrypted
so that hacker can never know what are the actual keys pressed. So
first lets have some background information about keyloggers and how
they works and then we will have solution to protect and secure our-self
from getting infected.

Protect your PC from Keyloggers

What is Keylogger?

Keylogger is basically a software
tool which clones your key strokes pressed and writes them into log
files. Some smart or simply say advanced keyloggers are retrieves the
saved passwords in web browsers and other windows applications. Hackers
use keyloggers to hack users email account passwords and other passwords and monitor their day to day activity.

How the Keylogger Works?

Lets explain this in very simple way,
Whenever you press any key on your keyboard or laptop your machine
generates a simple key code which depends on the keyboard format you are
using. That key code tell your operating system that you have pressed a
particular key. Now what keylogger does it save your key stroke into a
file. Now further processing depends upon type of Keyloggers. Basically
there are two types of keyloggers:

1. Physical keylogger

2. Remote Keylogger

The above processing is same for both physical and remote keyloggers. The difference lies in how they are gonna use a log file.

Physical keyloggers requires
physical access to a victim's system, so that hacker can install it
manually. He may be your friend, brother, sister or some close one who
actually has physical access to your PC or laptop. Now for getting logs
also he has to manually access your PC to check logs. But nowadays few
good physical keyloggers are there which sends logs on email address. So
nowadays we only need one time Physical access and that's just to
install Keylogger and configure an email address to send logs.

Remote keyloggers are a bit
different as there name suggest they can be installed from remote, means
you don't need any physical access. Remote keyloggers during
configuration generates a server that we can send to victim and which
does not need any installation. Remote keylogger maintains the records
into log files and when victim connects to internet it send the logs to
hacker's email address or FTP account that he has putted during
configuration time to receive logs.


As we all know new keyloggers are
always FUD (fully undetectable) so our antivirus doesn't show any
warning messages while infection. So the best method to protect yourself
from keyloggers is that encrypt your key strokes by using key
scramblers. What a keylogger does is that it monitors key strokes, so
when we encrypt our key strokes, Hacker will still receive logs but that
garbage as our keys are encrypted and hence he doesn't get anything and
victim will remain safe from his keylogger.

Let's understand it with example. Suppose you have typed


What key scrambler will do? It will
Encrypt your each key pressed into some garbage code and keylogger will
get this as something like:


So friends what scrambler has done is
that it has encrypted your keystrokes and saved you from getting prey to
hackers. Secure and protect yourself from keyloggers as you cannot
avoid them what you can just do is fool them by encrypting your


If you like my article please comment or simply you can say thanks. I will really appreciate your input.

If you have any queries and doubts let me know in form of comments..

Thanks for your time ..

Read more:

View previous topic View next topic Back to top Message [Page 1 of 1]

Permissions in this forum:
You cannot reply to topics in this forum