A good anti-spyware or anti-virus program may be able to detect keyloggers. Keyloggers typically hide in sneaky places, and a good anti-virus program that constantly updates its virus definitions can keep track of the latest keylogger tactics. Also, keyloggers function in ways that send red flags to anti-virus programs, so installing these programs, keeping their virus definitions up-to-date and running them regularly can help you detect software keyloggers.
If you press the Ctrl + Alt + Del buttons simultaneously, it brings up a Task List, which outlines all the applications and processes currently running on your computer. Many of these processes are normal, and your computer requires them to function. However, keylogging software has to show up on your application or processes list, so do a Web search for any unfamiliar processes or software to determine whether it's a normal part of Windows operation or whether it may be a keylogger. Likewise, you can run the msconfig utility to determine what starts up when you boot your computer. Once you launch msconfig, look for anything unfamiliar that might be a keylogger.
Software keyloggers require an Internet connection to transmit the data they gather from your computer. If you've got an active, secure firewall, keyloggers may not be able to transmit data, thus forming an effective way to block keyloggers. Some firewall programs even alert you when unfamiliar programs attempt to use your Internet access, so you can use this feature to discover whether keyloggers exist on your computer. Maintain an active firewall to help protect yourself from potentially dangerous keyloggers.
Hardware keyloggers can be a bit more difficult to detect than software keyloggers. In most cases, hardware keyloggers don't require an Internet connection to transmit data, because they function by storing the data on a little hard drive packaged with the device. If a keylogger is not a software program on your computer, the only way you can detect it is by physically locating the hardware device.
As we often notice that hackers always keep themselves one step ahead to defenders. anyways well share @ Aniruddha
ReplyDelete