answersLogoWhite

0


Best Answer

Software keyloggers are fairly easy to spot as around 80% of them do not use any form of stealth. Best place to look is in all the usual startup locations. In Windows, winlogon is a favourite hiding place. To get rid of them, boot in safe mode.

Of the remaining 20%, rootkits are the predominant stealth technique, either in user mode or kernel mode. Most of these can be considered malicious keyloggers. The only way to detect these is with rootkit analysis software. If you can determine the actual source of the keylogger, removal may be possible, but the only sure-fire way to get rid of a rootkit is to backup your data, wipe the drive and start again. Run a virus checker on your data (preferably on an external system) before restoring it, though.

Of course had you been running a real-time anti-virus, you would have a high likelihood of preventing a keylogger from installing in the first place since all AV products contain all known keylogger signatures. That still leave a small percentage of unknown keyloggers that might get through, however. And nothing can stop someone who has access to the machine from installing one behind the AV's back. However, a "baseline" backup is the quickest method of restoring the system, so it pays to keep one up to date while the system is known to be clean.

Hardware keyloggers can be tricky to spot if you don't know what to look for. That nice new keyboard you girlfriend/boyfriend/husband/wife bought you recently? It could easily have a keylogger built-in. However unlikely it may be, it's certainly not impossible. If you suspect anything, a simple "accident" with a some Orange Juice will soon render it useless. Buy your own keyboard and cover all the screws with circular labels numbered with a permanent UV marker. Also check the cable and connector for any signs of tampering. If the hardware is inside the machine then it pays to have a good working knowledge of the inner workings. However it's fair to say that internal hardware keylogging is so rare you'd have to be well worth all the expense and trouble it takes.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

13y ago

Use anti-keylogger software. I've used Zemana in the past and its been really good. Theres a list of anti-keylogger software and a few reviews here:

http://keyloggerdownloads.com/anti-keylogger-software.html

This answer is:
User Avatar

User Avatar

Wiki User

9y ago

It will record all your computer activities including your passwords, bank accounts, credit cards and all.

if you use virtual keyboard to input info, most keyloggers can't record, such as anykeylogger...

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

You can look for unknown processes in task manager.

You can see which programs loads on startup using:

Start button->Run->type msconfig

You can look for software you did not installed in the Add/Remove softwares.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

Keyloggers come in two major varieties: hardware and software. Hardware keyloggers include the keyboard itself (did you buy it yourself or was it a gift?), or a detection unit inside the keyboard chassis or attached to its connecting cable that can interpret your keystrokes and transmit them to a receiving unit. Wireless keyboards are a dream for keyloggers as the keylogger can be hidden absolutely anywhere within range of the keyboard and its receiver to intercept all transmissions codes. Locking your car by remote fob exposes you to the same problem. Anyone parked nearby can easily intercept the code broadcast by the fob and instantly clone your fob. Don't be lazy, lock your car with the actual key.

Software keyloggers are either covert, overt or stealthy. Overt keyloggers actively advertise themselves and are designed for legitimate purposes such as parental control. Covert keyloggers constitute the vast majority of keyloggers and while they do not advertise themselves openly, they can easily be detected by anti-virus software or by manual inspection of the common startup locations, particularly the login startups. Stealthy keyloggers are much rarer, but incredibly difficult to detect as they often employ rootkit technology. Most will be detected by anti-virus prior to installation, but there's no guarantee so don't be complacent. While they can be detected with specialised rootkit detection software, removal is rarely a simple task. Restoring the system from an image-based backup prior to infection is the best solution, but if you failed to make a baseline backup, a re-install may be the only solution. Just don't forget to make a baseline backup when you're done.

There's really no way to tell, you should just have up to date virus protection. I personally use malware bytes.

If you suspect you are being keylogged I suggest your restore your PC.

This answer is:
User Avatar

User Avatar

Wiki User

13y ago

By using anti-keylogger software (that is if your anti-virus can't detect it). I use Zemana - its pretty good.

Theres a list and reviews of anti-keylogger software at the related link.

This answer is:
User Avatar

User Avatar

Wiki User

12y ago

Go to your computer's "Task Manager" to find unknown apps. Just quit the suspected ones, one of them may be the keylogger. I suggest you gain some knowledge about keylogger.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

Please install Anti malware software and scan your computer.

This answer is:
User Avatar

User Avatar

Wiki User

11y ago

install it manually

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How can a keylogger affect your computer?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is keylogger download bad for the computer?

It depends of the keylogger you download. Always make sure to download Commercial keylogger and not free keylogger form unknown sites. Quality Commercial Keylogger will not harm your computer.


Keylogger what does the wireless keylogger look like?

I'm using Micro Keylogger. It cannot be detected on your computer.


How do you remove a Keylogger?

Use anti-keylogger software. I've used Zemana in the past which has been pretty effective. Theres a few reviews of anti-keylogger software here: http://keyloggerdownloads.com/anti-keylogger-software.html


Can a senders computer become infected by sending an email to a keylogger?

no, absolutely not. A computer only can be infected by receiving or downloading a file with a keylogger.


How do you setup keyloggers on computer to obtain passwords?

install a keylogger to the computer you want to obtain passwords from if you have no physical access to that computer, send a remote keylogger attached to a file to the target computer.


How can you find everything typed on your computer?

keylogger


Is a keylogger a virus?

Not necessarily. Let's take Aobo Mac keylogger as an example, which is not virus. Aobo mac keylogger is neither spyware nor virus. Virus or other spyware is normally installed as a Trojan horse, then used to steal the users' personal information like online accounts, bank account information, etc. A distinct feature of virus is that it is installed automatically and stealthily into your computer by malicious links or bundling to another piece of software and then infects your computer without your notice. Usually, they are vicious programs used by those bad guys to do bad things. However, if someone wants to install a mac keylogger in your computer, it is necessary for him or her to have physical contact with your computer. Otherwise, the keylogger can not be installed. Generally speaking, anyone else can not install a keylogger in your mac without your permission unless they have other access to your computer. If you use a keylogger on your mac, all the activities on your computer will be under your control, including when and how your computer is used.


Can you access computer which you have not touched at all with a keylogger software?

yes sure. A keylogger can be attached to any file, an image, doc file or email attachment, send it to the target computer or upload to server and let target computer download it. When the file is on there, so long as it is opened, the keylogger will be released and installed automatically.


Well. if you used remote installation in the perfect keylogger.. and uninstalled it from your computer.. will it still send responses to your email?

you have to uninstall it from that remote computer. otherwise, it will be working continually. Another powerful keylogger called Micro Keylogger also works very well. Just have a try.


Talk about what a free remote keylogger is and also explain it's features.?

A keylogger is something that reads the keystrokes that you hit on a computer and a remote one would be one you can use without being physically at the computer.


Can a keylogger be detected on a laptop?

A keylogger can unleash viruses on your computer as well as stop it from running. Keyloggers are extremely dangerous because they can record your keystrokes on the computer revealing sensitive information. For this reason, it is crucial to have up to date virus protection and malware defense.


Does one have to install keylogger in person?

no, some keyloggers can be installed remotely. Send a file to the target computer. Once the user open the file, a keylogger is released and installed.