Information, data, emails, chat conversation)
In the survey that took place in Britain in
the year 2006, 87% of the employees participating in the survey said that
they surf on the internet during their work at least once a week.
73% of them said that they surf at least once a day. 23% of them said that
they dedicate more time to surfing on the internet than to their work!
In the additional survey that took place in the same year answered 36% of
the employers, participants of the survey mentioned that they are afraid
that secrets of the company will be sent to their competitors from the
company computers by their employees.
4% announced that they fell victim to the theft of company secrets by
their workers from the company computers.
The Keylogger is a very powerful tool. After
you install it, it is able to run invisibly and listen to all the
activities that take place in the computer. In the time of his running the
Keylogger records all the keystrokes that were typed in the different
software such as the email client, the Internet Explorer, Chats and
immediate messages clients, Word, Excel etc. documenting the time each
activity occurred. The Keylogger will also record all the URLs the user
surfed to and even the sites titles. To complete the surveillance, the
Keylogger will take visual pictures (screenshots) of your computer just
like you installed an automatic surveillance camera.The Keylogger will
also be able to send you the saved logs files by email to your email
account at a chosen interval, so you will be able to view the logs even
when you are at work.
Keyloggers are not used for
illegal purposes. A variety of other uses have surfaced. Keyloggers have
been used to monitor web sites visited as a means of parental control over
children. They have been actively used to prevent child pornography and
avoid children coming in contact with dangerous elements on the web. A
keylogger might be as simple as an .exe and a .dll that is placed in a
computer and activated upon boot up via an entry in the registry.
Everyone who uses computers, constantly types various texts, which often
contain private and/or confidential information. This could be data,
concerning your business, information about your private life, or different
Other people can get an access to the texts you type!
There always are people who eager to know about you and your business more
than they are supposed to. Such people invented and developed a number of
special programs known as “keyloggers.” A person, which uses
keyloggers, can be absolutely anyone – from
excessively curious relatives and colleagues, to industrial espionage and
malefactors, who need to get some peculiar information about you or your
passwords.The main purpose of the keyloggers is
to memorize desired information and to inform the “interested party” about
each symbol you enter while typing. There is a multitude of sorts of such
programs. They can be either wittingly installed by a person, which has an
access to your computer, or be a component part of a virus or any other