The 'righteous' keyloggers

The 'righteous' keyloggers are keyloggers that have a way of expressing themselves 'in great clarity'. Most have the same characteristics as: show your name in 'Program Files', put your activity icon in the clock tray ...

Picture 1 of The 'righteous' keyloggers
The 'righteous' keyloggers are keyloggers that have a way of expressing themselves 'in great clarity'.

Most have common features such as displaying their name in ' Program Files ', putting their activity icon in the clock tray, can easily detect its activity in their ' Applications ' tab. ' Windows Task Manager ', not equipped with an underground operation mode, can be easily removed . Here are eight keylogger programs that are currently in the "mainstream" category.

a. 1-ACT Computer Spy 2006 : default installation directory named Only PCTools All-in-One1-ACT Computer Spy 2006 ; executable file named AdvKeylog.exe ; Export the keyboard activity log information as an XML file and contain these files in ' User ' located in the installation directory.

These XML files are named as : FilesLog (containing all information about file impact); KeysLog (contains all information when impacting on the keyboard); MailsLog (contains all information when using e-mail '; PrintersLog (contains information related to using the printer); URLslog (contains information related to web surfing).

b. Activity Keylogger: has the default installation directory named Activity Keylogger ; executable file named actik.exe ; save the keystrokes from the keyboard as HTM files ( chats.htm, clipboard.htm, keystrokes.htm, screenshots.htm, websites.htm ) and take screenshots in JPG format; The information recorded is placed in 'Log' located in the installation directory.

c. Stealth Keylogger: installed in a folder named MSK ; executable file named msk.exe ; creating a file containing keyboard information in HTM format placed in a 'deep' folder is C: Documents and SettingsUserLocal SettingsTemp ; Use the default hotkey combination Ctrl + Alt + Shift + M.

d. A + Stealth Keylogger: This keylogger application is extremely hidden in the C: Documents and SettingsAll UsersApplication DataSystemKey folder ; The executable file is named SystemKey.exe ; Use the default hotkey combination Ctrl + Shift + Alt + S to hide it; take a screenshot as a JPG file, record the keyboard operation as an 'unknown' XMM file and hide all in the default folder 'Logs' located in its installation directory.

This keylogger is a bit "venomous" in that it automatically hides itself too much without the need for the installer's intervention.

e. A-one Home Looker: the default installation folder name is A-one Home Looker ; executable file named VideoCap.exe ; Use the default hotkey combination Ctrl + Alt + S to hide it; has the ability to automatically send screenshots to an optional e-mail address; take screenshots in JPG file format, record keyboard operation as TXT file and hide all in a folder that users choose.

f. SpyAgent: The default installation directory name is Spytech SoftwareSpytech SpyAgent; The executable file name is sysdiag.exe; use hotkey combination Ctrl + Shift + Alt + M to hide it; being able to send recorded information to an e-mail; record keyboard operation as TXT and JPG files in the installation folder.

g. The PC Detective Pro: installs a folder called Common FilesThe PC Detective Pro ; The executable file is named Viewer.exe ; export the recorded files of computer operation in the form of TXT, take screenshots in JPG format and contain these files in the default folder is C: Program FilesCommon FilesMicrosoft SharedDAOPCD ; Use the default hotkey combination Ctrl + Shift + F8 to hide it.

hour. XP Keylogger: the default installation directory name is XP Keylogger ; The executable file is named services.exe ; Export computer activity log files as HTM and save in 'Logs' located in the program installation folder.

In addition to these commercial keyloggers, there are also a number of 'specialized software for parents' to 'manage children' or 'home computer management' . But in fact, it is all both of them are sophisticated keylogger tools, which can be exploited by bad guys to take away the personal information of innocent users.

HOANG HAI

Update 13 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment