Rabu, 05 Agustus 2009

The Advancement of the Keylogger



The Advancement of the Keylogger

A keylogger is a program that runs in your computer’s background secretly recording all your keystrokes. Once your keystrokes are logged, they are hidden away for later retrieval by the attacker. The attacker then carefully reviews the information in hopes of finding passwords or other information that would prove useful to them. For example, a keylogger can easily obtain confidential emails and reveal them to any interested outside party willing to pay for the information.  

Keyloggers can be either software or hardware based. Software-based keyloggers are easy to distribute and infect, but at the same time are more easily detectable. Hardware-based keyloggers are more complex and harder to detect. For all that you know, your keyboard could have a keylogger chip attached and anything being typed is recorded into a flash memory sitting inside your keyboard. Keyloggers have become one of the most powerful applications used for gathering information in a world where encrypted traffic is becoming more and more common.

As keyloggers become more advanced, the ability to detect them becomes more difficult. They can violate a user’s privacy for months, or even years, without being noticed. During that time frame, a keylogger can collect a lot of information about the user it is monitoring. A keylogger can potential obtain not only passwords and log-in names, but credit card numbers, bank account details, contacts, interests, web browsing habits, and much more. All this collected information can be used to steal user’s personal documents, money, or even their identity.  

A keylogger might be as simple as an .exe and a .dll that is placed in a computer and activated upon boot up via an entry in the registry. Or, the more sophisticated keyloggers, such as the Perfect Keylogger or ProBot Activity Monitor have developed a full line of nasty abilities including:

• Undetectable in the process list and invisible in operation
• A kernel keylogger driver that captures keystrokes even when the user is logged off
• A remote deployment wizard
• The ability to create text snapshots of active applications
• The ability to capture http post data (including log-ins/passwords)
• The ability to timestamp record workstation usage
• HTML and text log file export
• Automatic e-mail log file delivery

All keyloggers are not used for illegal purposes. A variety of other uses have surfaced. Keyloggers have been used to monitor web sites visited as a means of parental control over children. They have been actively used to prevent child pornography and avoid children coming in contact with dangerous elements on the web. Additionally, in December, 2001, a federal court ruled that the FBI did not need a special wiretap order to place a keystroke logging device on a suspect’s computer. The judge allowed the FBI to keep details of its key logging device secret (citing national security concerns). The defendant in the case, Nicodemo Scarfo Jr., indicted for gambling and loan-sharking, used encryption to protect a file on his computer. The FBI used the keystroke logging device to capture Scarfo’s password and gain access to the needed file.



Selasa, 14 Juli 2009

Blind Gentlement


MY curiosity, in a sense, was stronger than my fear,
for I could not remain where I was, but crept back to
the bank again, whence, sheltering my head behind a
bush of broom, I might command the road before our
door. I was scarcely in position ere my enemies began
to arrive, seven or eight of them, running hard, their
feet beating out of time along the road and the man
with the lantern some paces in front. Three men ran
together, hand in hand; and I made out, even through
the mist, that the middle man of this trio was the
blind beggar. The next moment his voice showed me that
I was right.

“Down with the door!” he cried.

“Aye, aye, sir!” answered two or three; and a rush was
made upon the Admiral Benbow, the lantern-bearer
following; and then I could see them pause, and hear
speeches passed in a lower key, as if they were
surprised to find the door open. But the pause was
brief, for the blind man again issued his commands.
His voice sounded louder and higher, as if he were
afire with eagerness and rage.

“In, in, in!” he shouted, and cursed them for their delay.

Four or five of them obeyed at once, two remaining on
the road with the formidable beggar. There was a
pause, then a cry of surprise, and then a voice
shouting from the house, “Bill’s dead.”

But the blind man swore at them again for their delay.

“Search him, some of you shirking lubbers, and the rest
of you aloft and get the chest,” he cried.

The Time Machine



 The Time Traveller (for so it will be convenient to speak of
him) was expounding a recondite matter to us. His grey eyes
shone and twinkled, and his usually pale face was flushed and
animated. The fire burned brightly, and the soft radiance of the 
incandescent lights in the lilies of silver caught the bubbles
that flashed and passed in our glasses. Our chairs, being his
patents, embraced and caressed us rather than submitted to be sat
upon, and there was that luxurious after-dinner atmosphere when
thought roams gracefully free of the trammels of precision. And
he put it to us in this way--marking the points with a lean
forefinger--as we sat and lazily admired his earnestness over
this new paradox (as we thought it:) and his fecundity.


Senin, 13 Juli 2009

Historical Associations


Dear Uncle Jim. this garden ground
That now you smoke your pipe around,
has seen immortal actions done
And valiant battles lost and won.

Here we had best on tip-toe tread,
While I for safety march ahead,
For this is that enchanted ground
Where all who loiter slumber sound.

Here is the sea, here is the sand,
Here is the simple Shepherd's Land,
Here are the fairy hollyhocks,
And there are Ali Baba's rocks.
But yonder, see! apart and high,
Frozen Siberia lies; where I,
With Robert Bruce William Tell,
Was bound by an enchanter's spell.


Sabtu, 11 Juli 2009

The Wind


I saw you toss the kites on high
And blow the birds about the sky;
And all around I heard you pass,
Like ladies' skirts across the grass--
  O wind, a-blowing all day long,
  O wind, that sings so loud a song!

I saw the different things you did,
But always you yourself you hid.
I felt you push, I heard you call,
I could not see yourself at all--
  O wind, a-blowing all day long,
  O wind, that sings so loud a song!

O you that are so strong and cold,
O blower, are you young or old?
Are you a beast of field and tree,
Or just a stronger child than me?
  O wind, a-blowing all day long,
  O wind, that sings so loud a song!


Jumat, 10 Juli 2009

CHAIN LETTERS AND PYRAMID SCHEMES - WHY THEY DON'T WORK!


If you are active in mail order, you've no doubt seen tons of chain letters 
and pyramid programs. In case you're not familiar with them, here's an 
overview, so you know what to watch out for.

Chain letters are those letters you get, instructing you to send, say $5, 
to the 4 to 6 people on the list, who will send you a report, or some 
product, or sometimes even nothing. Then, you add your name to the bottom 
of the list, moving the others up, and the top one off. 

 You then print and mail out as many as you can, hoping others will do the 
same as you. The letters are liberally sprinkled with references to how much 
money you will make, and how many people are sure to participate. Some even 
go so far as to promise you $1,000,000 and more, sometimes in less than a month!

Pyramid schemes are what chain letters are based on. You buy into one, 
then you need to recruit others below you, to move you up the line. The 
people you recruit, in turn, need to recruit others, and so on. Pyramids 
go by all kinds of names and formats. 

Rabu, 08 Juli 2009

The Fisher and the Little Fish


It happened that a Fisher, after fishing all day, caught only
a little fish. "Pray, let me go, master," said the Fish. "I am
much too small for your eating just now. If you put me back into
the river I shall soon grow, then you can make a fine meal off
me."

"Nay, nay, my little Fish," said the Fisher, "I have you now.
I may not catch you hereafter."

A little thing in hand is worth more than
a great thing in prospect.