PC Supporter: We are writing reviews & overviews about latest Technology, Gadgets, Social-networks, HP Printers, Operating Sys, PC Games & Wallpapers

Friday 7 January 2011

Keylogger Trojan?


By Mary Landesman



In its simplest form, a keylogger trojan is malicious, surreptitious software that monitors your keystrokes, logging them to a file and sending them off to remote attackers. Some keyloggers are sold as commercial software - the type a parent might use to record their children's online activities or a suspicious spouse might install to keep tabs on their partner.

Keyloggers may record all keystrokes, or they may be sophisticated enough to monitor for specific activity - like opening a web browser pointing to your online banking site. When the desired behavior is observed, the keylogger goes into record mode, capturing your login username and password.

Some sites attempt to thwart keyloggers by having the user respond to visual cues they must point to with their mouse instead of using their keyboard. However, some keylogger trojans also capture screenshots, thereby negating the effect of this strategy.

Keyloggers and other forms of remote-access trojans tend to be the most determined malware, taking extra steps to stealth its presence, including through the use of rootkits.

The best defense against keyloggers is prevention. One of the most common infection sources is peer-to-peer (P2P) filesharing networks, such as Kazaa, Morpheus, Gnutella, and dozens of others. Keyloggers are also commonly sent as email attachments and via links in instant messages that point to the infected file.

Too often, people are lulled into a false sense of security, believing, for example, that if they simply switch to a different browser they will be safe from harm. It's simply not so simple. To stay safe means becoming proactively engaged in your own security.

What is a Rootkit?

By Mary Landesman





Definition:

A rootkit gives attackers full access to the system (hence the term 'root') and typically hides the files, folders, registry edits, and other components it uses. In addition to hiding itself, a rootkit typically hides other malicious files that it may be bundled with.

The ubiquitous Storm worm is one example of rootkit-enabled malware. (Note that not all Storm Trojans are rootkit-enabled).everal free rootkit scanners are available to help ferret out the presence of these hidden menaces. For best results, scan the system with at least three of these free rootkit scanners on a regular basis in addition to your normal antivirus scanning. But remember - there's simply no substitute for prevention. Check out Tips for Safety to be sure you're taking the right steps to defend your PC. And never underestimate the power of simplicity some behavior-based tools can help alert you to suspicious behavior that may be indicative of a rootkit. Spybot TeaTimer (free) monitors the critical system areas that malware exploit in order to gain a foothold on the system. Used properly, a permission-based firewall, such as the free ZoneAlarm, can also help alert you to the signs of a hidden infection.