2022
Permanent URI for this collection
Browse
Browsing 2022 by Author "Muhammad Aveen Ur Rehman, Dua a Zahra, Sumbal Binte Tahir and Ahmar Ali Sheikh"
Now showing 1 - 1 of 1
Results Per Page
Sort Options
Item Keystroke monitoring system(UMT, Lahore, 2022) Muhammad Aveen Ur Rehman, Dua a Zahra, Sumbal Binte Tahir and Ahmar Ali SheikhKey loggers can be integrated into more complex software like Trojans that ensure the data delivery back to the attacker. It's still popular and often used as part of larger cyber-attacks. When a hacker (or a script kiddie) uses this for unethical purposes, he/she will register everything you type in the keyboard including your credentials (credit card numbers, passwords, etc.). Key loggers collect information and send it back to a third party – whether that is a criminal, law enforcement or IT department. The software is installed on your computer, and records everything you type. The passwords and credit card numbers you type, the webpages you visit – all by logging your keyboard strokes. Then it sends this log file to a server, where cybercriminals wait to make use of all this sensitive information. The most basic forms may only collect the information typed into a single website or application. Some variants of key loggers – especially those targeting mobile devices – go further and record information such as calls (both call history and the audio), information from messaging applications, GPS location, screen grabs, and even microphone and camera capture.