A lot of people don't know that there's many kinds of Keyloggers:
- Keylogger Software -
A hidden program that can be planted in the hard drive, simply saving all of the computer activities and keyboard inputs to a file that usually sent to an email that the observer entered in the keylogger installation.
_____________________________________________________
- Keylogger Hardware -
Now days there are a big verity of hardware keyloggers:
- Standard keylogger hardware (usb,ps2) -
Attached somewhere on the keyboard cable between the computer usb or ps2 ports and the keyboard, logs all keyboard inputs without depending on any programs or operating system. * Cannot be detected by any software.
- Wireless Keylogger -
One of my favorite keyloggers - it Collects packets of data being transferred from a wireless keyboard and its receiver between the two devices. Also cannot be detected by any kind of software!
- Keyboard overlays -
A keylogger overlay is fitted to look like a standard part of a hardware system. These overlays are often used at ATM terminals where the customer's PIN is recorded when the overlay is pushed along with the numbers on the ATM terminal.
- Firmware -
Very good method as well, A computer's BIOS can be reprogrammed so that it records keystrokes as it processes them. I will write a post about this method including guides and tips.
Monday, October 19, 2009
Sunday, October 18, 2009
What is "Cyber-Spying" ?
The word "cyber": a combining form meaning “computer,” “computer network,” or “virtual reality".
"Cyber-Spying" - Or "Computer surveillance" contains ways to track all kinds of computer and internet operations.
Cyber surveillance methods:
- Keyloggers - A keylogger is a hardware device or a software program that records the real time activity of a computer user including the keyboard keys they press.
- Trojan Horses - are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for a hacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of the Trojan horse.
- Spyware - is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user.Can take all password saved on the computer.
- Monitoring Software - Very effective Complete monitoring of the computer activities from one PC. Real time and accurate detailed stats of what your employees or students do. Unprecedented control. Complete invisibility. Superb tracking.
- E-mail, IP and Phone Records Lookups - Lookups and Reverse lookups are Necessary to identify a certain computer user.
Saturday, October 17, 2009
Who Am I?
Hey, I am Steve Smith, A full time Cyber-Spy.
When I was young me and my lil brother shared one computer, and I always suspected him for doing nasty things, you know... Like watching porn and fill our computer what all kinds of viruses.
But of curse the little punk claimed his innocent, and that's the first time I discovered "Cyber-Spying".
Yap.. Planted a simple keylogger and got the lil criminal red-handed.
Since then I passed a long way, learning and developing all kinds of Cyber-Spying methods, tactics, hardware and software.
I'm happy to say that this hobby of mine became an honorable and profitable profession.
Now IM are working with all kinds of people from divorce lawyers to big companies that suspect and wants to keep workers under surveillance.
I give them all the information they want, well what's permitted by law and workers contracts.
I will tell you 1 thing: THIS JOB IS FASCINATING.
You have no idea what are the things I being revealed to!
Well most of the things I can't post on the internet but I will try to give you glimpses from my world.
Also will share with you my ways of work and methods I use.
Wish you a pleasant reading.
Steve.
For feedback and questions:
Email: s.smith950@gmail.com - it may take some time but I will reply you.
AND REMEMBER: It is a good chance that you're being watched right now!
Subscribe to:
Posts (Atom)