Spyware and key loggers

15
BY GANESHDEV CHAVHAN THIRD YEAR COMPUTER ENGINEERING ROLL NO 20140608 SUPPORTED AND GUIDED BY MR. ROSHAN KOTKONDWAR SPYWARE AND KEY-LOGGERS Dr. Bababsaheb Ambedkar Technological University, Lonere.

Transcript of Spyware and key loggers

Page 1: Spyware and key loggers

BY GANESHDEV CHAVHAN

THIRD YEAR COMPUTER ENGINEERING

ROLL NO 20140608

SUPPORTED AND GUIDED BY MR. ROSHAN KOTKONDWAR

SPYWARE AND KEY-LOGGERS

Dr. Bababsaheb Ambedkar Technological University, Lonere.

Page 2: Spyware and key loggers

AGENDA

Spyware1. What is Spyware ?

2. The Beginning ..

3. How to detect ?

4. How to protect ?

5. Advantages and Dis-advantages.

Key-loggers1. Key-loggers ?

2. Types

3. Example and Uses:

4. Live Demo:

5. How to defend?

Page 3: Spyware and key loggers

What is Spyware ?Spy- ware =Spying Software Basically spyware deals with computers

and internet.Like spying remotely on someone using there own computer without their

acknowledgement

"Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies. Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users.

Page 4: Spyware and key loggers

THE BEGINNING…

The word 'spyware' was used for the first time publicly in October 1995.

It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsoft's business model.

Page 5: Spyware and key loggers

How To Detect ? Loading time of your PC Startup Programs Auto Homepage Setting Pop-ups

Page 6: Spyware and key loggers

?

How to protect?

Page 7: Spyware and key loggers

Ad-ware Survey Data gathering Parental Control Software Ethical Hacking

ADVANTAGES

Page 8: Spyware and key loggers

DIS-ADVANTAGES Slower Computer Unwanted Data Useless and Vulgar Pop-Ups Privacy

Page 9: Spyware and key loggers

Key-Logger ?

Page 10: Spyware and key loggers

TYPES

Hardware Based Software Based

Page 11: Spyware and key loggers

Examples and Usage1. Best Key-logger2. Actual key-logger3. Perfect Key-logger4. Hardware based Key-loggers.5. MyJad Key-logger and many

Page 12: Spyware and key loggers

How to Defend ? Do not use freeware like C-cleaner or any Speedup Software

Don’t install unwanted application or 3rd Party Applications

Don’t visit or click on pop-ups

Always Check startup menu and remove unwanted

Page 13: Spyware and key loggers

Source:

• http://www.softnic.com• http://www.spy-blog.blogspot.in• http://www.9dot9.com

Special Thanks to:

• MS-Office and Photoshop

• Freeware's.

Page 14: Spyware and key loggers

Any Questions ?

Page 15: Spyware and key loggers

Thank You !