Hacking For Beginners – Manthan Desai

2010

And you are done we have traced the person.....

And from where he had sent the email.

Keystroke loggers

 Keystroke Loggers (or Key loggers) intercept the Target’s keystrokes and either saves them in a file to be readlater, or transmit them to a predetermined destination to the Hacker.

 Since Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a widevariety of confidential information, including passwords, credit card numbers, and private Email correspondence,names, addresses, and phone numbers.

Types of keyloggers

 Hardware keylogger

 Software keylogger

Some Famous keyloggers

 Actual Spy

 Perfect Keylogger

 Family Keylogger

 Home Keylogger

 Soft Central Keylogger

 Adramax Keylogger

www.hackingtech.co.tv

Page 26