Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 8

Key-loggers

Actual Key-logger

Actual Key-logger is a program that monitors the activity on your computer so you can discover

what other users are doing on your computer when you are not present. 

The key-logger software keeps track of programs run or closed, websites visited and any

keystrokes pressed, and can also record screenshots and content copied to the clipboard.

The actual key-logger works by recording the key strokes entered by the user of the computer

and saving the input to the software itself. The software also stores occasional screenshots from

websites visited.
Spyrix Personal Monitor

Spyrix Personal Monitor is a powerful multifunctional program for complete and detailed

REMOTE MONITORING of user activity. It can monitor keyboard (Key-logger) activity,

activity on social, running and active applications, printing activity and external storages. The

program allows conducting control remotely no matter where you are located by sending logs to

your email, FTP or LAN and viewing logs from your account online. It cannot be detected by

computer users and antivirus programs. The program is perfect for parental control and

controlling employees.

Spyrix Free Key-logger works by recording and displaying information that has been inputted by

the active user. Options such as Keyboard events, Screenshots, Sound Recordings and Web

Pages Visited can be accessed. For this lab activity, the Keyboard events option has been

utilized, information inputted by the client to gain access to an email account. The software

stores backspace events as well as all characters which have been typed. In order to access the

information, the key-logger has to be started and refreshed after it has been stopped.
BlackBox Security Monitor Express

BlackBox Security Monitor Express provides you with a simple, yet powerful tool for

monitoring multiple local or remote computers in your network, while encrypting data to ensure

complete privacy. It reads and collects information from the target computers and sends it to

your PC, enabling you to view exactly how each workstation is used.

BlackBox Pro works by recording/saving the information that is entered or viewed by the

user of the computer. The software has options to ‘set up’ accounts for different PCs, where each

PC has a unique ID and a variety of options can be selected for each user. In this event, no

specifications were set, due to lack of knowledge of the software. As seen in the screenshot

below, the various applications being used were shown along with the Program name, Start

Time, End Time and the Computer being used. Being displayed in the screenshot example, is the

Cisco Packet Tracer software.


This second screen shot shows the key log for a google search on “how to use blackbox pro” as
well as email login info for a gmail account.
Comparison of Key-Logger Software

 Of all the key-logging software, Actual key-Logger appears to be the simplest with the

most basic features.

 All three pieces of software offer application logging, which gives details on which

applications are opened and closed.

 All three pieces offer invisibility while on the operating system, this means the user will

be unable to detect that the software is in use.

 All three also allow for screenshots to be taken periodically of user activity.

 It appears that BlackBox Software Monitor is the only key-logging software that is able

to collect data from multiple computers and generate a summary from the information

received.

 Spyrix appears to be the only logger which allows for live viewing of a screen in live

mode or for multiple screens to be viewed at the same time. This key-logger also offers a

remote uninstallation feature.


Encryption

Axcrypt

AxCrypt is the leading open source file encryption software for Windows. It integrates

seamlessly with Windows to compress, encrypt, decrypt, store, send and work with individual

files.

Veracrypt

VeraCrypt is a free disk encryption software brought to you by IDRIX and based on TrueCrypt

7.1a.It adds enhanced security to the algorithms used for system and partitions encryption

making it immune to new developments in brute-force attacks. It also solves many vulnerabilities

and security issues found in TrueCrypt. 

OpenStego

OpenStego is a tool implemented in Java for generic steganography, which is the science of

hiding secret message inside another larger and harmless looking message. Steganography is

greater than cryptography, which just obscures the original message.

You might also like