Viruses, trojans, spyware, ... always been an obsession with computer users. But now there is a threat that many people may know, there is a hardware device "fancy" name keylogger.
This is a product shaped like a USB Flash, just bigger than a little coin 2000, has the function of recording all actions that you've hit on the keyboard, similar to software keyloggers hide themselves in system . Keylogger will probably be the strongest anti-virus program detected. However, advertising on the site of the manufacturer, this device is not a hardware keylogger program can recognize. Hardware keyloggers no driver, no batteries, no special software attached that is still active, so those who are not proficient on the hardware devices that are difficult to detect.
Market, Vietnam has many kinds of hardware keylogger, but the most common type used for PS / 2 keyboard, and those for USB keyboard attached.
PS / 2 using a first male plug into PS / 2 computer, also head of the plug into the keyboard PS / 2, just as small as a cigarette, 4-5cm length.
USB port type is small and shaped to look like local switch from keyboard PS / 2 to USB, you must look closely to realize.
Common point of these two is the victim of a keyboard connected to it first and then plugged into the computer. This device uses shared power with the source of the keyboard, recording every action you type on your keyboard, then copied to its own memory (like a Flash drive). Depending on the device is large or small, but they have different prices.
Their capacity ranges from 128KB to 4MB (higher is kind of 1GB or 2GB). Price from 60 USD each and 90 dollars.
Hardware keylogger expensive price, but sometimes still not "getting" with the personal account passwords stolen!
However, you can still find cheap prices on eBay with prices from $ 25 to $ 60, with the categories and different capacities. Just kind of 4MB is enough to record all your actions throughout the week (over 200 A4 pages full of text).
When reading this article, you should observe the following computers are used in offices, or at public Internet access points, see picture on the device or not. If discovered, to disable it, you just pull it away from your computer and plug the keyboard into the pin is the same.
More information for you: The advantages of this device is not being identified by the software. Only add it to the victim knows the password to activate it. To use this device, just a text editor such as Notepad, Word, ... type the correct password and press Enter as possible to the device's main menu to see what it recorded. Looking at the main menu, you feel like working with the menu in DOS, but the environment is used in the text editor.
Above are two types of easily recognizable and most easily removed. However, there still exists a variety of new and more difficult to detect. The writer will present some kind of new to know how you prevent yourself.
* Type the form of a compact electronic board, can be mounted inside the desktop computer keyboard. Who will install equipment to remove the keyboard, drawing pin USB plug as shown below and implanted devices in accordance with diagrams keylogger. This category is difficult to detect.
Normal keyboard
The keypad is "implanted" keylogger
* For use in laptop keyboard: is a circuit board, battery to separate sources, were implanted into the laptop, above the CPU fan. A pin connector to plug in the keyboard's wire, and the other end has a plug to the wire sheath into the main board in the laptop. This type rarely seen since it is difficult to obtain data (only ones exposed to the chance of your laptop and install the new obtained data only).
* Type is finally blooming, and developed many variations on the most popular wireless network is a keylogger (on Google to find out more, you will find many websites selling this type). This category most expensive, over 160 USD each, but has the advantage that no action needs to be implanted on a computer to obtain data.
The device is shaped like the two above, and also is a board type implanted into the keyboard as above. Victims were implanted device is not detected by any software, but the installed equipment will access the device via the wireless waves (over distances up to 150m), and devices connected by password that they set out, as well as easily download the information stolen was the victim did not know. In addition, there is some kind of wave to use Bluetooth to communicate, thus creating more favorable distance and compatibility with other devices such as laptop access, mobile phone.
The equipment on dangerous, they like a parasite lives quietly in the computer and steal your valuable data we should be very careful. Especially in an era of intense competition today, for his opponent into a device installed in your computer and your company across the street sat leisurely drink and download all project data the company is entirely possible. For under $ 200 so it is too cheap for that information. Whether it is detected without any evidence being denounced.
This is a warning bell for computer users to be careful when working. When the machine is damaged, repairs must remember to select the places they trusted to avoid the loss of top secret data.