Keep your computer activities private – stop keyloggers and system monitors.
Back in the days of less powerful systems, when 256 Meg of RAM and a Pentium 3 running at 665 MHz was considered the height of computing power, system slow down, or a slow Internet experience, was suggestive of a malware infection.
Today, the most dangerous and most finely crafted malware, will not generally impact your system resources in such a way as to cause noticeable slow down. This type of malware is designed to remain undetected and to be as stealthy as possible, so that it can get on with its designated task, which most often results in identity theft and the compromising of your financial data.
One of the most sinister malware of this type, one I have always made sure to guard against, is the keylogger.
A software keylogger, or system monitor, is a small program (not always malware) that monitors every keystroke a user types on a computer’s keyboard. A keylogger application does not necessarily require physical access to the user’s computer. It can be downloaded by someone who wants to monitor activity on a particular computer, or it can be downloaded unwittingly as spyware and executed as part of a rootkit, or a remote administration (RAT) Trojan horse.
Keyloggers are not restricted to software applications however, and are available as a connected hardware device.
Hardware keyloggers are used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computer keyboards and the computer, typically inline with the keyboard’s cable connector.
More stealthy implementations can be installed or built into standard keyboards, so that there’s no device visible on the external cable. Both types logs all keyboard activity to their internal memory, which can subsequently be accessed, for example, by typing in a secret key sequence.
A hardware keylogger has an advantage over a software solution; because it is not dependent on installation on the target computer’s operating system, it will not interfere with any program running on the target machine and also cannot be detected by any software. However its physical presence may be detected, for example if it’s installed outside the case as an inline device between the computer and the keyboard. Some of these implementations have the ability to be controlled and monitored remotely by means of a wireless communication standard.
A malware keylogger typically consists of two files: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke and uploads the information over the Internet.
Luckily, there is a remedy for this type of malware threat.
SnoopFree Privacy Shield is a powerful application that guards your keyboard, screen and open windows from all such spy software. It makes it virtually impossible for any spy program to work on your computer since SnoopFree Privacy Shield’s unique protection works against spy software in real time.
I have been using this application for quite some time on my Windows XP machines, and I have been amazed at the number of programs that have requested access to my keyboard and screen, particularly programs that I was in the process of installing.
Since I test a lot of applications, I see this type of program behavior frequently. Unless there are valid reasons for this type of access, I don’t allow it. Surprisingly, in most cases the application installs correctly. Curious!
If you’re serious about privacy, then this free application is a must have addition to your security toolbox.
System Requirements: Unfortunately, this application works on Windows XP only.
Download at: Download.com