Welcome back ! Feel free to look around. If you like what you read, mention us in your post or link to this site. Hope to see you again

Wednesday, 9 November 2011

Intro. to Rats, Keylogger's , Malwares..etc.

Follow Hackers Spot


Hy Friends to day i will be writing about  Malware Programs.....I will introduce you here with all topics related to that so that you dont have any problem in reading and understanding the things discussed here...
Malware
Malware has been a problem for ages, Malware is short form of malicious software. A Malware is basically a program designed to infect a computer system without owner being informed.
Types of Malware
Malware exists in many forms, below mentioned are some of the common types of malware
1. Trojan Horse – Trojan virus or Trojan horse is one of the most common types of malware, Trojan virus is mostly used to control the victims computer rather than infecting or destroying files on victims computer. A Trojan horse once installed into victims computer can give a hacker complete access to your computer. Trojans are one of the most dangerous forms of malware.
2. Computer Viruses – A computer virus a malicious program which is mostly developed to infect a computer, once it infects a computer it replicates or reproduces itself. A virus is just like a parasite and it needs another host to attach to in order to infect a computer
3. Worms – Worms are almost similar to computer viruses the only difference unlike computer viruses they do not require another host to attach to in order to infect a computer. Once a worm infects a computer it replicates itself. Computer worms are major threats to large networks.
4. Keyloggers - A Keylogger is a hardware or software device which monitors every keystroke, screen shots, chats etc typed on the
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com Page 10
computer. A keylogger program does not require physical access to the user's computer. Any person with a basic knowledge of computer can use keylogger
5. RATS – RAT is the short of “Remote Administration Tool” and is indeed one of the most dangerous types of malware. It’s very similar to a Trojan. Once a RAT is installed in a computer the attacker can do almost anything on the remote computer such as installing a keylogger, shutting down a computer, infecting files etc.
6. Adware – Adware is the short form of Advertisement-supported software. Adware’s are commonly designed to display advertisements on your computers. However some of these adwares may contain harmful viruses and spying programs which can bring your computer system to knees.
So these are the most common types of malware, the next chapter will explain you all about keyloggers.
Copyright 2011 Rafay baloch | http://rafayhackingarticles.blogspot.com Page 11
Keyloggers
Keyloggers can be classified into two main types:
1. Hardware Keylogger
2. Software Keylogger



This is where software keyloggers come into play, Software keyloggers can also be classified into two types:
1. Local Keylogger
2. Remote Keylogger
Local Keylogger
Local Keyloggers are used to monitor local computers (May be your own Pc), they are very easy to install and are completely undetectable and it’s really hard to figure out once a keylogger is installed on a computer because usually keyloggers hide themselves from taskmanager, Windows Registry etc. Whenever you want to see logs, screenshots etc you just need to press a hotkey which (ex. Shift+Ctrl+F10).
There are hundreds of keyloggers available now days but some of them are userfriendly and are actually capable to hide themselves once they are installed, some of the Popular Local Keyloggers are:
1. Spyagent
2. AllSpy Keylogger
3. Refog keylogger

1 comment:

  1. Hello, if you even require a legit hacker to help monitor any cell phone remotely, contact deadlyhacker01@gmail.com or whatsapp: +1 3478577580
    They're very reliable.

    ReplyDelete