What if we lost a laptop? and what should we do?
The first way we can:
1. Asked mbah shaman
2. Police
3. Buy new
4. Install CCTV
5. Crying all night
This
ridiculous that we do when as the above, as saying that we in the IT
people will understand everything about IT (not what - what little too
much) we should not do like the example above. Well
Story from the experience temen - temen maen me who likes games with their cheating
IT
as a child I did not receive the treatment with their cheating on me
hence I started looking about - guess what I can do to repay them?
It's
show times, without thinking I take modemku and switched computer for
browsing bututku ria in a while I get a good article on the site in
which http://www.xxxx.com menjelsakan what keylogger
First I do not believe with all that but WOW will work well kok wah - wah I was too excited about the story well
Ok I'll explain now
What Is KeyLogger
Keylogger is a kind of tools used to pry people like mothers - women who like to gossip.
Type - type Keylogger
There Keylogger 2 forms, namely software and hardware. Both have different characteristics but one purpose, as well as Indonesia, although different - different remains one
Now we'll know a few types of keylogger software versions:
a. PC Spy Keylogger
b. Invisible Keylogger
c. KGB Keylogger
I think enough to sample the product this keylogger, ok I will take the first example for the PC Spy Keylogger, the following
Now we will know the next version of Keylogger Hardware:
Some providers of diversified hardaware keylogger can be found at the following sites:
1. www.keyhost.com
2. www.keykatcher.com
3. www.amesisco.com
4. www.keyloggersdirect.com
Which will make the question, how well to buy a tool - this tool?
Maybe it could range from U $ 100 more. The disadvantages are as follows:
a. Easy on the detection
b. The most expensive was clearly
Well
perhaps only the explanation of much for me and I want to write too
tdak more detail in because of fear even in use for this - it is not
good
The following example script keylogger antidote:
Example programs made here is a simple example. I use the Visual Basic programming language. Easy to understand but, sangking easy until now nobody can also create sophisticated applications through this VB ... hiks ... Everyone
deals with the language much more difficult to reply, in fact the
output is much better when made with VB (for easy time yah). For me the problem is easy or not depends on what the output. Why should the way marnok learn to America ...
Let us direct to manufacture yah ...
1. Open the Visual Basic Designer you (I pake v.6)
2. Add a TextBox control, then give the value of the property "Name" to "txtPassword"
3. Log into the form code window, fill in the following source code:
'<- START CODE ->'
'*********************************************
'EXAMPLE OF ANTI KeyLogger TO VISUAL BASIC'
'**********************************************
'FOR EXPLANATION OF THE FUNCTION API, JUST FIND THE INTERNET:)
Private Declare Function VkKeyScan Lib "USER32" Alias "VkKeyScanA" (ByVal cChar As Byte) As Integer
Private
Declare Sub keybd_event Lib "USER32" (ByVal bVk As Integer, ByVal bScan
As Byte, ByVal dwFlags As Long, ByVal dwExtraInfo As Long)
'Function For Creating Value From Interval Certain Random ....
Function RandomNumber (ByVal LowerBound As Single, ByVal UpperBound As Single) As Single
Randomize Timer
RandomNumber = (UpperBound - LowerBound) * Rnd + LowerBound
End Function
Private Sub txtPassword_Change ()
TxtPassword.Locked = True '<== Deliberately not Let Food Resource Many
LoopC As Byte Dim i As Byte
LoopC = RandomNumber (3, 254) 'Create a Random Value From 3 to 254
i = 0
'A lot of Keyboard Random Event Delivery Every time Type ...
Do While LoopC> i
'Send Event Keyboard Disrupting Let The Random Value Which Arrested Keylogger
Call keybd_event (VkKeyScan (RandomNumber (32, 126)), 0, 0, 0)
i = i + 1
Loop
DoEvents' love the opportunity of other programs work:)
TxtPassword.Locked = False
End Sub
'<- END CODE ->'
Run ... you will see will look as follows:
Figure 1. Application Monitoring Anti Keylogger
Feel free to experiment with a keylogger. Oh,
yes I downloaded from the site one example of a simple keylogger that
you can download also shared the concerns of all of this article. Sample output is:
Figure 2. Keylogger application with the watchful eye.
From here you can see, we made the application (Figure 1) I enter it only 3 characters. However, strangely the keylogger (figure 2) gives the results of monitoring more dar 3 characters. Well, I think you already understand the algorithm of the source code above. Yup! Exactly,
it was not the keylogger culprit but we were intentionally to outsmart
keylogger keyboard capture the actual event we do not make but made by
the program and the keyboard event is not issued in the position of the
text blink in memory but that will be used in programs that use this
case keylogger it means he's caught !!!.... well ... hmmm confused
Well, suppose my password is "IDA", and will fill the application form input (fig. 1). First of all when I press the letter "I" on the keyboard. keylogger
will receive the output of typed letters plus typing letters sent by
the program that we created with the form and the random number. Similarly, when I type the next letter is "D", and so on. See the following formula:
Output Keylogger = (One character is typed) + (character created by the application program randomly Random X Value)
X = times / total
If'm so ... Certainly, the growers will keylogger confusion given the results of monitoring keylogger. huehueheueheue .. kapok let anyone prankster who used keylogger to steal the rights of people .... Finally wueeekkk ... maybe not quite this article also explains about the security concerns of this keylogger. Well, the advice I learn. Because if you just read it, and hold not developed ... I give the same but you put your seeds in dry soil. Useless ... I want a friend - can be a great friend of all. Amen. .
27.1.10
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment