A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
Spyware and key loggers
1. BY GANESHDEV CHAVHAN
THIRD YEAR COMPUTER ENGINEERING
ROLL NO 20140608
SUPPORTED AND GUIDED BY MR. ROSHAN KOTKONDWAR
SPYWARE AND
KEY-LOGGERS
Dr. Bababsaheb Ambedkar Technological
University, Lonere.
2. AGENDA
Spyware
1. What is Spyware ?
2. The Beginning ..
3. How to detect ?
4. How to protect ?
5. Advantages and Dis-advantages.
Key-loggers
1. Key-loggers ?
2. Types
3. Example and Uses:
4. Live Demo:
5. How to defend?
3. What is Spyware ?
Spy- ware =Spying Software
Basically spyware deals with computers and
internet.
Like spying remotely on someone using there
own computer without their acknowledgement
"Spyware" is mostly classified into four types: system
monitors, Trojans, adware, and tracking cookies. Spyware is
mostly used for the purposes of tracking and storing Internet
users' movements on the Web and serving up pop-up ads to
Internet users.
4. THE BEGINNING…
The word 'spyware' was used for the first time publicly in October
1995.
It popped up on Usenet (a distributed Internet discussion system
in which users post e-mail like messages) in an article aimed at
Microsoft's business model.
5. How To Detect ?
Loading time of your PC
Startup Programs
Auto Homepage Setting
Pop-ups
11. Examples and Usage
1. Best Key-logger
2. Actual key-logger
3. Perfect Key-logger
4. Hardware based Key-loggers.
5. MyJad Key-logger and many
12. How to Defend ?
Do not use freeware like C-cleaner or any Speedup Software
Don’t install unwanted application or 3rd Party Applications
Don’t visit or click on pop-ups
Always Check startup menu and remove unwanted