Showing posts with label PC Tips. Show all posts

FAQ On Keyloggers - A Complete Guide

I have written a few articles on Keyloggers , Yet i get lot of comments and emails from readers asking me various doubts and clarifications, so to clear them. i have started a new section in my blogFAQ i have compiled and answered all frequently asked questions about key loggers


FAQ  On Keyloggers - A Complete Keylogger Guide

1. What is A Keylogger 
A keylogger also called as spy software  is a small program that monitors each and everykeystroke a user types on a specific computer’s keyboard. A keylogger program can be installed in just a few seconds and once installed, you are only a step away from getting the target password and other sensitive data.


2. What Are The Types Of Keyloggers 
Software Keyloggers
Hardware Keyloggers

3. How Keylogger Works 
Basically once when a Keylogger is installed on a PC, it starts operating in the background it captures the keystrokes typed by the victim some advanced Keyloggers even capture screen shots and sends them to the attacker via Email , FTP etc

4.  What is The Use Of Keyloggers 
Since Keyloggers capture every keystroke and its stealth (Invisible) Its mainly used formonitoring children, Spouse , Workers . It is also used by hackers to Hack email accounts , Face book Accounts etc

5. Do I need any special knowledge to install and use the keylogger?
No, now a days Keyloggers are very user friendly, Can be used by anyone who has basic knowledge of Computers

6. Can the victim detect it's presence once key logger is installed in his/her computer?
This depends on the Keylogger which you use, usually Free Keyloggers are easily detected by Av's. To my knowledge the once which are not detected are Sniper spy, realtimeSpy , Win spy and more..

7. Can Victim Trace Back Me After i install the Keylogger in His/Her computer
No, its impossible to trace you back

8. Which is the Best Keylogger 
Today, there exists hundreds of key loggers in the market and most of them are no more than a scam. So, I have personally tested some of the top keyloggers and concluded Sniper Spy as the best one And as an alternative You can use Win spy
9. Why Sniper Spy ?
Sniper spy eliminates the need for Physical Access Not only that it has some of most advanced features such as live Monitoring , bypass Firewalls, Record Scree shots etc. It has its own server where all the victim logs get stored thus eliminating the need of third party Email Accounts Or FTP Accounts , People who have already used key loggers will know the use of this, usually ordinary key loggers use GMail or ymail for Receiving logs lately GMail have started banning email accounts which are being used for receiving key logs

10. How Sniper Spy Works
After you purchase Sniper spy, you’ll be able to create the installation module using an easy set-up program. You need to email this module to the remote user as an attachment.When the remote user runs the module it’ll get installed silently and monitoring process will begin. The keystrokes are captured and uploaded to the Sniper Spy servers continuously.You can login to your Sniper spy account (you get this after purchase) to see the logs which contains the password.

11.  I don’t have physical access to the target computer. Can I still use Sniper Spy?
Yes you can! Sniper Spy supports remote instillation feature which allows you to remotely install the program on any PC even if you have no physical access to it. For remote installation, all you need to do is just place the module in a .zip/.rar file and send it as an attachment to the target email address (for which you need the password).

12. What if the antivirus prevents me from sending an email attachment?
Instead of sending the key logger as an email attachment, it is recommended that you place the file in .ZIP/.RAR format and upload it to www.fileden.com. After uploading, just send the direct download link to the victim via email. Once he downloads the file from this link and run it, thekeylogger will get installed automatically.

13. Can I install Sniper Spy on a local computer?
If you need to install to your local computer instead of your remote computer, then the process is simple. Simply navigate to the folder in which you saved your module. Double-click the module file name to execute it. Nothing will appear on the screen but the software gets installed silently.


Hope This FAQ guide helps you to understand what is keylogger & how it work.
Friday, 26 September 2014
Posted by Unknown
Tag :

Top 10 Free Keyloggers

10 FREE KEYLOGGERS TO MONITOR YOUR LOCAL PC OR LAPTOP!

keylogger logo

HERE IS AN EXCLUSIVE LIST OF TOP 10 FREE LOCAL KEYLOGGERS. HOWEVER IF YOU ARE PLANNING TO MONITOR ONLY YOUR PC OR ANY PC WHICH YOU HAVE CONTROL OF, THEN YOU CAN BLINDLY GO FOR “HARDWARE KEYLOGGERS” AS THEY ARE THE SAFESTKEYLOGGERS AND OPERATE IN A COMPLETE STEALTH. IF YOU STILL WANNA PREFER FREE KEYLOGGERS THEN BELOW IS THE LIST OF FREE KEYLOGGERS THAT WILL REALLY HELP YOU MONITOR YOUR PC.





1) REFOG FREE EDITION

Refog Free Keylogger beats competition in two respects: it’s simple to use and it’s free. REFOG Free Keylogger can look after your children without them even noticing. Even technically minded children won’t detect the key logger when it runs in a stealth mode. The program removes all the shortcuts and can be accessed only through a hot key combination. Running unobtrusively from the moment the system boots, REFOG Free Keylogger keeps track of all typed or pasted text.

->Download It From HERE


2) Black box express

Simple to use monitoring of one local computer; Monitor Screen recordings, Programs, Keystrokes typed, Websites, Web Searches, Emails/Webmails/ Instant Messenger Chat sent and received. Alerts and Warnings instantly or as a summary on your e-mail or cell phone. everything for 100% Free. No strings attached.

->Download It From HERE


3) PERSONAL KEYLOGGER

The Personal Keylogger application was designed to be a small tool that will allow you to secretly record all keystrokes and other input. All specific instructions are explained in the application. To exit it and receive your logs, you will need to enter in your keycode. If you have forgotten your keycode, you will need to restart the computer. Keycode is like password. To stop Personal keylogger, you can enter your keycode anywhere on the screen. Once you type-in your keycode, the keylogger will stop monitoring and the log.txt file will be created in your selected destination folder.

->Download It From HERE


4) PY KEYLOGGER

PyKeylogger is an easy-to-use and simple keylogger written in python. It is primarily designed for backup purposes, but can be used as a stealth keylogger, too. It does not raise any trust issues, since it is a short python script that you can easily examine. It is primarily designed for personal backup purposes, rather than stealth keylogging. Thus, it does not make explicit attempts to hide its presence from the operating system or the user. That said, the only way it is visible is that the process name shows up in the task list, so it is not immediately apparent that there is a keylogger onthe system.
#Tip: Press and hold ‘left-CTRL + Right-CTRL + F12′ keys simultaneously to bring up the Control Panel (default password is blank).

->Download It From HERE


5) HERETIC MACRO

Heretic is a powerful tool that is able to record user events, such as mouse clicks and keys, into a C/Java-like script, and play that script either once or repeatedly. It has many commands for dynamic pixel-based botting, window based botting, and static botting/macro-ing (i.e. key presses, mouse clicks, mouse moves, and pauses).

->Download It From HERE


6) Ultimate Keylogger

Ultimate Keylogger Free is a free popular all-round monitoring solution. It runs in the background and monitors all typed keystrokes, applications, passwords, clipboard, email, and visited websites’ URLs. You can view the reports as HTML files. Ultimate Keylogger Free will help you to find out, what exactly took place in the system.

->Download It From HERE


7) Actual keylogger

It runs hidden in the background and automatically records all keystrokes (including Alt, Ctrl and other functional buttons). The interface can be password protected and the log files are encrypted. You can view the reports as HTML or plain text. In the hidden mode it is invisible in all operating systems.

->Download It From HERE


8) Revealer Keylogger Free Edition

Revealer Keylogger is surely the easiest and faster way to record keyboard inputs. There is almost nothing to configure, in fact everything is configured internally with the best settings. Free keylogger monitoring tool that logs every keystroke even passwords behind asterisks and conversations in common instant messengers. Its interface is password protected, the software does not appear in Add/Remove programs or in the taskbar.

->Download It From HERE


9) Romaco Keylogger

Romaco Keylogger is a small and easy to use tool that can log all key-presses that are made while it is running, and display them to you in its window. It automatically exports the logged text to a text file every 5 minutes, or manually. It can be hidden at the click of a button, and recalled by vigorously pressing one of the least used keys on the keyboard, the break key.

->Download It From HERE


10) KidLogger

KidLogger collects user activity journal on the Computer and creates detailed Analysis of the user activity available online. Creates the list of most used web sites. Record the text was typed on the keyboard in any application


->Download It From HERE

Note: This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do. Hacking email accounts is criminal activity and is punishable under cyber crime.

Posted by Unknown
Tag :

How To Activate Windows 8 (Easy Activation Method)

Windows 8 Activation Method
Are you looking for the easiest method to activate your Windows 8? Then this article here will make your day perfect. In this post I will be giving tutorial on ‘How to Activate your Windows 8 Operating System’. Read this tutorial guide and follow them to clearly know the easiest method ever to activate Windows 8. Please read below given introduction and then the complete tutorial is given. Please proceed further.
As we all know about the history of Windows 8, it was firstly announced at 2011 CES, two years after Win 7 was officially released in 2009. By October 2012, Microsoft had completely released the Windows 8 operating system which has been followed upon the release of pre-release versions. As of now, Microsoft come up with various versions including the Pro and Enterprise, each versions having several other segments as Pro N, Pro VL and so on.
Posted by Unknown

How To Lock Your Windows PC Or Laptop With USB - Extra Security





Do you want to add an extra layer of PASSWORD SECURITY to your computer in your absence. Then you can try locking your computer with USB Lock. Yes you can use USB as key just like we use normal keys to unlock the keys.So you need need the USB drive to unlock the computer. You will be having access till the USB drive is present connected to the computer. It will be automatically locked if the USB drive is disconnected from the computer. This way you can add another layer of security to your computer.

In order to use lock your computer you need to get a software tool "Predator"Professional Edition here[official link] and Free Edition from Here[official link]
Choose the best suitable one depending on your operating system bit. 

Step by Step Process for How to Lock PC with USB

  • After Downloading after Predator. Connect the USB Drive that you want to use as key to your computer.
  • And then run the predator installation.
  • Before continuing installation. A popup will ask you to create the new password, Enter your desired password and then hit on Ok to continue.
  •                        predaytor
  • Now predator will present you a box with preference settings.
  • predaytor+2
  • You can change settings as per your need and you can add the USB drive by selecting the drive under Flash Drive settings and hit on create key to generate a key on the usb which will be used by the predator to monitor.
    • When Predator is running on your computer you can see the predator icon in the taskbar as shown in below image.predatro+3
    • And Predator offers one month free trail of the Professional edition which include sending of twitter messages to you and many more features.
Posted by Unknown

How to enable or disable USB Drives or Ports in Windows 7 | 8

Restrict access to USB drives

There are 5 ways an administrator can prevent using of USB Drives
They are:
  1. Altering registry values for USB Mass Storage device
  2. Disabling USB Ports from Device Manager.
  3. By Un-installing the USB Mass Storage Drivers
  4. Using third-party freeware
  5. Using Microsoft Fix It.
Lets us look at how we can fix these problems and enable USB on Windows 7 PC.

1. Enable or Disable USB Drives and Mass Storage Devices using Registry

If the administrator is smart then he would definitely do this to ensure a tight blockade. He would alter the settings through regedit command on run console. Now how do you unlock it ? You have to go right into where the administrator has been. Here is how.
  1. Go to Start > Run , type “regedit” and press enter to open the registry editor
  2. Navigate to the following key
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\USBSTOR
In the right pane, select Start and change the value to 3. (The value 4 will disable USB Storage). Click OK. This will re-enable USB Ports and allow you to use USB or Pen drives.


2. Disable USB Ports from Device Manager

If you still don’t find your USB drive working, you may have to look into the Device Manager. The Administrator could have possibly disabled the USB port here. Check out for any possibility in the Device Manager and enable the disabled port by right clicking on selected one and click Enable.

3. Uninstall USB Mass Storage Drivers

If the authorities are really worried about security in the school they would take the extreme step of un-installing the USB Mass Storage Drivers. To make things work, just install the device drivers. Here is how you do it.
As when you plug-in your USB drive, Windows will check for drivers, if not found Windows will prompt you to install the driver. This would definitely unlock the Pen drive at your School or office.

4. Use USB Drive Disabler / Enabler

You can download and use a free tool USB Drive Disabler / Enabler which will allow you to easily enable or disable USB drives on your Windows computer.

5. Prevent users from connecting USB

If a USB storage device is already installed on your Windows computer, you can edit the Widnows Registry to ensure sure that the USB does not work when anyone connects it to the PC, using this Microsoft Fix it 50061. Check first if it applies to your version of the Windows operating system.


Thursday, 31 July 2014
Posted by Unknown
Tag :

Popular Post

Powered by Blogger.

Copyright © Makewealths Tips | Designed by Alexander Orah -