Minor Project Presentation Topic: Keylogger and PC Monitoring System

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 19

Minor Project Presentation

Topic: Keylogger and PC monitoring system

Project Mentor: Professor Gaurav Saxena


1
Presented by: Divyansh Sengar, Divyansh Gupta
Shantanu Awasthi
2 Contents

 What is Keyloggers
 Groups of Keyloggers
 Features
 Preventions
 Conclusion
3 What is Keylogger

Keylogger is a computer program that records every keystroke made


by a computer user, to gain fraudulent access to passwords and other
confidential information.
Keylogging is also known as Keystroke logging.
It can also be used to study human–computer interaction. 
There are two basic purpose to use Keyloggers.
 To monitor employee performance
 To access confidential information
4 Types of Keyloggers

There are different types of Keyloggers divided into two main groups.
1. Hardware Keyloggers
2. Software Keyloggers
5 Software keyloggers
Remote- access software keyloggers can allow access to locally
recorded data from a remote location. This communication
can happen by using one of the following
methods:
 Uploading the data to a website, database or FTP server.
 Periodically emailing data to a predefined email address.
 Wirelessly transmitting data through an attached hardware system.
 Software enabling remote login to your local machine.
6 Additional features that some software keyloggers come with can capture
additional information without requiring any keyboard key presses as input.
They include:
 Clipboard logging – Anything that can be copied to the clipboard is
captured.
 Screen logging – Randomly timed screenshots of your computer
screen are logged.
 Activity tracking – Recording of which folders, programs and
windows are opened and also possibly screenshots of each.
7 Clipboard logging
 Anything that can be copied to the clipboard is captured.
 The clipboard is a buffer that some operating systems provide for
short-term storage and transfer within and between application
programs. The clipboard is usually temporary and unnamed, and its
contents reside in the computer's RAM. The clipboard is sometimes
called the paste buffer.
8
9 Screen logging
 Randomly timed screenshots of your computer screen are logged.
 Python 3 library pyautogui is used.
 Time of taking the screen shots can be set accordingly.
10
11 Requirement Analysis
Daily Report for the Admin:
 The Keylogger will be capable of maintaining daily report of the
activities done on the PC, which includes images and text files.
The daily report will be mailed to the PC owner on his/her
email.
 The timing of the email and the email address can be changed
later in the settings
12
13 Keyboard Monitoring
 Python 3 library pynput is used to record the every key stroke in a
text file.
 Pynput library is not used for on screen keyboard.
 These keystrokes saved in text file will be maintained for 7 days.
14
15
16

 Maintaining the log files:


 The keylogger will maintain the files containing the keystrokes for a
maximum of 7 days.
 The program will than automatically delete the past files.
 This setting can also be changed later.
17
Preventions

 There several ways to prevent keyloggers:


 Anti-virus/spyware & Firewalls
 Automatic Form Fillers
 On screen Keyboard
18 Conclusion
 As there always two sides of coin just like this keylogger has good
as well as bad reputation.
 In the world of hacking it is use to hack someones personal details.
While on the other hand it is used in a company to monitor any
suspecious activity that may cause serious liabilityto the company’s
benefit.
 But we must aware what is installed on the computer. Use when
surfing the internet. Keep your computer’s security software
updated.
Flow chart
19
COMPOSITION

BACKEND FRONTEND

Tkinter
LANGUAGES

FEATURES

SQL PYTHON
DAILY REPORT
SENT TO ADMIN
PRACTICAL USES BY E-MAIL

SECURITY AND
MONITORING

You might also like