Keyloggers (Hardware & Software)
it is imperative to use clandestine methods to protect your IT
infrastructure or assets, to protect one from civil and criminal
liability, or for a parent to protect their children.
these cases a widely acceptable practice is the use of a
keylogger (short for keystroke logging), either a hardware or a software tool.
hardware keylogger is a tool that is usually inserted between the
computer and the keyboard. What it does, is to record every
keystroke from the keyboard in a file. Once this file is retrieved,
one can re-create the entire session that has been recorded. This
tool will allow access to everything the computer user did,
including login details (user ID and passwords).
Forensics recognises the need for legitimate use of these
devices for security in business or for the safety of minors. In
either case, the client will have to sign an agreement, allowing us
access to this detail, and assuming all responsibility towards the
computer user or the minor.
is also another kind of keyloggers, a software version. That is a
piece of software usually running in stealth in the background. It
also records keystrokes, but it has the advantage of taking
screenshots in predefined time laps, and save them, or email them in
real time to whoever is monitoring it.
pieces of spyware are actually keyloggers, and for this, most
anti-malware software see a keylogger as a threat. If you require
such a software to be installed, we shall make all the necessary
arrangements so it will not create conflicts with your anti-virus
and anti-spyware infrastructure.
Strathclyde Forensics can help you determine if a keylogger has been
installed in your computer as well as help you install one in order to
protect your business or your family.