Monday, April 30, 2007

Software Key Logger Review (Spy Software)

Welcome to my Keylogger review blog.

There are legitimate & illegitimate uses for key logger type Spy Software.

Some watch a child’s Internet activity, or monitor employees while in a work environment. Some use spy software just to see if anyone is using their computer when they are away.

Many times key logger type spy software is used by family members spying on other family members. Husbands & wives watching each others Internet usage. Even ex spouses who want to find anything that will help them in their upcoming divorce proceedings

Computer recording software is, according to our findings, used more & more unethically and even illegally by those who want to steal sensitive or private information from you, or your business, without ever being caught. Some spy software users are just curious as to what you do on your computer.

Identity Theft has graduated to the NUMBER 1 crime in the United States today surpassing drug abuse and all other crimes!

There are over 500+ companies selling this stuff and many are making a fortune. Don't take my word for it,if you want to find examples, a Google search for “Spy Software” will reveal plenty.

At the time of this writing there were over 20 million results in Google for the term spy software.

That should tell you something of the popularity of this type of software and may also cause you to wonder if your computer hasn’t possibly been infected.

I mean think of it. Spy Software gives ANYONE who can turn on a computer the skills of a seasoned computer hacker. Spy Software allows whoever purchases it, the ability to covertly monitor ANY computer in the world!

Many of these key logger type spy software products can be remotely installed right over the Internet.

If you're a credit card thief and you need some credit card numbers to purchase things online, it's very simple to harvest credit card numbers from multiple computers if you have spy software installed.

Heck if you're a really nasty type, you can blackmail people by harvesting sensitive emails, or chats that you capture from others computers.

The biggest problem I've found with this type of monitoring product is that it's perfectly legal to buy or sell.

Many don't understand how identity theft got so big, but we see horror stories everyday, and these stories are increasing exponentially.

Just go to www.ftc.gov and read all about it.

Saturday, April 28, 2007

Hardware Key Logger Review

Hardware Keyloggers

These types of keyloggers require that the perpetrator have physical access to your computer. They can easily be installed in less than 5 seconds. They come in the form of USB port connectors, keyboard connectors and even masquerade as keyboards themselves.

Once installed, a hardware keylogger will capture every keystroke entered into your keyboard and then store it for future retrieval on the device itself.

Some hardware keylogger companies boast a two million keystroke capacity! That’s about 5 years worth of typing for the average computer user. Whether at home or in the office, you can easily fall victim to this type of spying. A Hardware Keylogger is installed between your keyboard and computer, like this:


Some hardware keyloggers come in the form of a keyboard, but if you examine the line going to the computer you can see an irregular bulge as pictured below. That should make you very suspicious




Some Key Loggers come in the form of a USB Drive

How do they work?

All hardware keyloggers have to have the following:

· A microcontroller - this interprets the datastream between the keyboard and computer, processes it, and passes it to the non-volatile memory

· A non-volatile memory - this stores the recorded data, even when power is lost
On the whole, typing a special password into a computer text editor retrieves the recorded data. As the hardware keylogger is plugged in-between the keyboard and computer, it detects the password has been typed and then starts presenting the computer with "typed" data to produce a menu.

Beyond text menu some keyloggers offer a high-speed download to speed up retrieval of stored data, this can be via USB mass-storage enumeration or with a USB or serial download adapter.

Friday, April 27, 2007

Spy Vs Spy

Many companies are marketing Spy Software & Key Loggers as an easy way to watch your children’s Internet use or your employees’ use of your computers, but keep in mind that these products can be used by criminals to watch you just as easily.

If they are designed to be concealed from the computer operator, they can be used by the bad guys too…

Covert High Tech Tools We Will Cover In This Blog

· Hardware Keyloggers - what they are and what they look like.

· Computer Spy Software – what spy software is and how it’s used to monitor employees, children and maybe even used to spy on you.

· Computer Spy Software Detectors: what you need to be sure no one is spying on you, including the most popular spy software detection products.

Electronic Eavesdropping & Keylogger Reviews

ID Theft is the number one crime in America as of this writing.

As the smoke clears from the sudden onslaught of computers and the Internet, millions of people are suddenly discovering their private information isn’t as private as they thought it was.

In fact, many law enforcement agencies are learning that electronic information theft is quickly becoming the nation’s number one way that crooks are using to get their hands on goods and services with the least chance of getting caught!

Many successful cyber thieves are finding it extremely easy to scour someone else’s computer for passwords and credit card numbers from the comfort of their own homes.

Most of the tools used to spy on other people’s computers are freely bought and sold over the Internet under the guise of legally sold hardware and software.

This blog will expose the most common and least known ways a criminal can steal from you, without you suspecting a thing.

Law enforcement just can’t keep up with the cyber tide so consumers and business owners are now in the precarious position of protecting themselves or else suffer the consequences.

All of us use computers for filing our taxes, running our companies, and for purchasing everything from prescriptions to automobiles over the Internet.

Most people don’t know how easy it is for anyone with a computer and Internet access to “electronically” peer over our shoulder, while we access our bank accounts, trade stocks or chat with our loved ones.

Our goal here is to expose to you the most used tools of the cyber criminal and show you how to protect yourself.