Mavis Beacon

.

Typing Computer Program

How do I Obtain Everything That Has Been Typed on a Computer?

By Adam Parker, eHow Contributor How do I Obtain Everything That Has Been Typed on a Computer? thumbnail

Keyloggers are a category of software that intercepts each keystroke entered on a computer's keyboard. The keylogger program saves these keystrokes to a log file for later viewing. The obvious value in this is to determine what someone is doing on his computer. Bank information, passwords and sensitive communications are all targets. Depending on intended use, a keylogger may be illegal, and subject the person using it to criminal penalties. In general, the unauthorized collection of data without the knowledge of the target individual or a court order would be legally questionable. If you install a keylogger on a PC, inform the people who will use the keyboard.

Things You'll Need

  • Keylogging program

Instructions

  • 1. Install the keylogging software on the target computer. This requires administrative access to the computer. Run the keylogger's setup program. Follow the installation wizard until completion. Popular packages include Refog, Spector Pro and Web Watcher (see Resources).

  • 2. Configure the keylogger's discreet mode options. Most keyloggers run silently in the background. The program does not display an icon or window while running. Perceptive users, though, know how to look at running processes to find suspicious software. Keyloggers generally include an option to cloak their presence by running with an innocuous sounding name.

  • 3. Set up the keylogger's email options. As the program logs data, it sends a file to a predetermined email address at a predetermined interval. Set up the email address, and how the program sends the log file with newly collected data.

  • 4. Test the configuration. Ensure the program is properly collecting data, and email functionality is active. Once confirmed, the program is ready to begin data collection.

Tips & Warnings

  • Hackers frequently use keyloggers to compromise the accounts of unsuspecting users. Bank information, passwords and sensitive communications make typical targets. Law enforcement also use keyloggers in a type of investigative wiretapping.

  • Many anti-spyware and anti-virus programs will detect the presence of a keylogger.

[[blockquote style="border: 0px; overflow:auto; width:100%; margin:0; padding:0;"]]

Adam Parker

Adam Parker has been writing professionally since 1996 and is an expert in the areas of international business development and technology. He has 15 years of global experience in 20 countries consulting businesses and governments on these topics. His writing has appeared in industry papers and journals for Citibank, Nestle and Bechtel. Adam holds a Bachelor of Science in information systems.

[[/blockquote]]

Resources

Original article published on eHow.com

Next page: Typing Free Software


Bookmark/Share This Page:

ADD TO DEL.ICIO.US ADD TO DIGG ADD TO FURL ADD TO NEWSVINE ADD TO NETSCAPE ADD TO REDDIT ADD TO STUMBLEUPON ADD TO TECHNORATI FAVORITES ADD TO SQUIDOO ADD TO WINDOWS LIVE ADD TO YAHOO MYWEB ADD TO ASK ADD TO GOOGLE ADD TO MAGNOLIA ADD TO NING ADD TO RAWSUGAR ADD TO SPURL ADD TO TAGTOOGA

  Bookmark and Share

Mon, 28 Jul 2014 20:25:37 +0000
Mon, 28 Jul 2014 20:25:37 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mavis Beacon...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mavis...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:25:38 +0000
Typing...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Encore...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000

Author: Mindscape
...
Mon, 28 Jul 2014 20:25:38 +0000
Mavis...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:38 +0000
Mon, 28 Jul 2014 20:25:39 +0000

Author: Mavis Beacon
Company: The Software...
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Word 2013...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:19:31 +0000

Author: Unknown
Company:...
Mon, 28 Jul 2014 20:19:31 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Logitech...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:39 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
...
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Encore 8014398...
			</div>
			<div>
<a href=more info...
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:40 +0000

Author: Kriya Systems
Company: BradyGAMES...
Mon, 28 Jul 2014 20:25:40 +0000
Mon, 28 Jul 2014 20:25:41 +0000
Mon, 28 Jul 2014 20:25:41 +0000
Mon, 28 Jul 2014 20:25:41 +0000
Mon, 28 Jul 2014 20:25:41 +0000
(1987-01-01)
Used Price: $39.52
Mon, 28 Jul 2014 20:25:41 +0000
Mon, 28 Jul 2014 20:25:41 +0000