Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Keystroke logging
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
=== Anti-spyware / Anti-virus programs === Many [[anti-spyware]] applications can detect some software based keyloggers and quarantine, disable, or remove them. However, because many keylogging programs are legitimate pieces of software under some circumstances, anti-spyware often neglects to label keylogging programs as spyware or a virus. These applications can detect software-based keyloggers based on patterns in [[Subroutine|executable code]], [[heuristics]] and keylogger behaviors (such as the use of [[Hooking|hooks]] and certain [[Application programming interface|API]]s). No software-based anti-spyware application can be 100% effective against all keyloggers.<ref>{{Cite journal|last=Creutzburg|first=Reiner|date=2017-01-29|title=The strange world of keyloggers - an overview, Part I|url=https://www.ingentaconnect.com/content/ist/ei/2017/00002017/00000006/art00019|journal=Electronic Imaging|volume=2017|issue=6|pages=139β148|doi=10.2352/ISSN.2470-1173.2017.6.MOBMU-313|url-access=subscription}}</ref> Software-based anti-spyware cannot defeat non-software keyloggers (for example, hardware keyloggers attached to keyboards will always receive keystrokes before any software-based anti-spyware application). The particular technique that the anti-spyware application uses will influence its potential effectiveness against software keyloggers. As a general rule, anti-spyware applications with [[Ring (computer security)|higher privileges]] will defeat keyloggers with lower privileges. For example, a hook-based anti-spyware application cannot defeat a kernel-based keylogger (as the keylogger will receive the keystroke messages before the anti-spyware application), but it could potentially defeat hook- and API-based keyloggers.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)