Monitoring Your Computer – What Keyloggers Can Do in 2012

Fifteen years ago a keylogger was exactly what the name implied; software (or sometimes hardware) that logged keystrokes. Back in the days of Microsoft DOS this was all you needed but these days that would only show you half the picture. As technology has advanced so has the way you track and monitor it, especially as the majority of our computer activities now involve the internet.

If you haven't heard of a keylogger before (or computer monitoring software as it's more commonly known these days) it's software that you can install to run silently, hidden on your computer. Once running it monitors everything that goes on on your computer, and using a secret key combination and password you can 'un-hide' the software at any time to view the reports.

The first feature is almost always the ability to record keystrokes. If I had a keylogger on my computer right now it would be recording this as I type it and tell me that it had been typed in Microsoft word, along with the date and time. Good keyloggers will also tell you which website you are typing into, which means you can also record passwords and web based email.

A modern keylogger (or computer monitoring software) will usually take screenshots at set times. This could either be every X seconds/minutes, or simply whenever a new window or website is focused or called. Application use and website visits will also be monitored, along with the date, time and duration of visits.

This is usually the standard set of features you'll find on most keyloggers, a long with a handful of more advanced features. Printer jobs can be monitored, along with which printer was used and the time and date. File activities can also be monitored, which involves logging new, saved, opened and deleted files. Both of these features can be handy for offices, where monitoring documents and print jobs is important.

Remote e-mail reporting is another feature you'll find in a lot of 2012 keyloggers. You'll be able to enter your SMTP details and get the logs sent to your email account, eliminating the need to go back to the actual computer to view the logs. Some software even boasts a remote log in feature, that enables you to log in to the monitored computer in real time to view and read reports.

Although most of these features are becoming common, computer monitoring software can now monitor pretty much any aspect of your technological life. Webcams and microphones can be monitored with some software, meaning you can identify exactly who's using your computer. In fact, keyloggers have even spread to cell phones. A program installed on your cell can tell you everything from exactly where the phone is to who's being texted and called.

The features in todays computer monitoring software are so advanced that whatever your need, you'll find a solution. If you need stealth and a hidden solution, there will be software to match. If you need absolute remote reporting, you'll find something. In fact, there are now so many features that the term 'Keylogger' should be obsolete. 2012 is the year of Computer Monitoring Software.


Lewis Waller, the author of this article runs 'Gecko Monitor' – the powerful and stealthy computer monitoring software. To download a free trial of Gecko Monitor head to http://www.geckomonitor.com/

Share:

0 comments:

Post a Comment

DISCLAIMER

The information provided on hottechtips.blogspot.com is to be used for educational purposes only. The website creator is in no way responsible for any misuse of the information provided. All of the information in this website is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” on hottechtips.blogspot.com should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk.