ANSWERS: 1
  • Key-logging originally started with hackers and their Trojans sneaking into people's computers to get passwords for accounts, particularly security systems and bank accounts. However, this subtle type of program has also been useful for organizations to catch and prove their employees' use of company resources for non-business activities when disciplining them. In either case, there are a few ways to identify if the software exists on your PC.

    Ask the Company

    If you think your company or employer is using a key-logger, just ask the Information Technology staff. Most companies will disclose in general that they are using some kind of monitoring software to their employees so they don't run afoul of illegal spying and wiretapping laws. In fact, many companies will proactively tell their employees that the software exists and have them sign awareness policy documents and place them in the employees' personnel files. This is useful if later the employee tries to argue he didn't know there were restrictions on computer use in the company.

    Antivirus Screening

    Most commercial and off-the-shelf key-logger programs have already been identified by antivirus companies that search for viruses, Trojans and automated hacks. This screening software can go through your computer and look for any of these programs and disable them. On a home PC this is fairly easy; just install the antivirus software and let it scan. On a business network this may be harder; you may need administrator rights to install the screener on your specific PC.

    Custom Logger Screening

    Some software packages exist that go after noncommercial, custom key-loggers. You can download these from Cyberhawk or Kaspersky.

    Be Sherlock Holmes

    If you know how to dig around your desktop registry without crashing your computer, you can find the signs of a key-logger yourself. Regedit, a registry editor program provided free by Microsoft, can open the Windows registry for review. Remember, registry files are sensitive. So you better know what you are doing if you change a file, because it could take down an entire function of your Windows operating system.

    Be Proactive

    If you suspect your company is using a key-logger software or some other kind of monitoring system on its computers, don't get in trouble. Avoid misusing your computer and save your riskier activities for when you are at home or on your own computer. For your private protection, avoid downloading files or software you don't know about. Use a security software like McAffee firewall to notify you if you hit a Web page that is trying to download a file without you seeing it. Being cautious up front can save you a lot of problems later, including with your bank account and your job.

    Source:

    Windows Skills: blog: "How to Find (Fight) Key-loggers"

    PCWorld: article: "Fight Back Against Surveillance Software"

    Adoko.com: article: "Detect a Key-logger"

    More Information:

    Kaspersky Antivirus Software

Copyright 2023, Wired Ivy, LLC

Answerbag | Terms of Service | Privacy Policy