UGC Approved Journal no 63975(19)

ISSN: 2349-5162 | ESTD Year : 2014
Call for Paper
Volume 11 | Issue 5 | May 2024

JETIREXPLORE- Search Thousands of research papers



WhatsApp Contact
Click Here

Published in:

Volume 11 Issue 1
January-2024
eISSN: 2349-5162

UGC and ISSN approved 7.95 impact factor UGC Approved Journal no 63975

7.95 impact factor calculated by Google scholar

Unique Identifier

Published Paper ID:
JETIR2401653


Registration ID:
532155

Page Number

g446-g451

Share This Article


Jetir RMS

Title

Enhancing System Monitoring Capabilities through the Implementation of Stealthy Software – Based Keylogger: A Technical Exploration

Authors

Abstract

compared to past generations, modern civilization is much more reliant on electronics. This dependence has benefits and drawbacks. Although there are several advantages, one disadvantage being susceptible to rogue software can quickly overshadow them all. One such spyware is a keylogger. Previously, the main focus was merely on recording a user's keystrokes, but today they are renowned for adding a wide range of functionality. Keyloggers are a type of rootkit malware. These keyloggers are used to steal private information secretly, and because they operate entirely in stealth mode, it is difficult to identify them. Keyloggers are used in everything from Microsoft products to the computers and servers used by your workplace. In rare circumstances, your mate may have installed a keylogger on your laptop or phone to support their accusations of adultery. The keylogger can capture all actions associated with the emphasis placed on console keys or movement of the working environment. One of the main causes of the keyloggers' explosive development is that programs operating in user space can track every keystroke that a system's users’ type. Keyloggers represent a serious risk to both personal and professional activities such online banking, email communication, and system database. A password is a phrase or word that is used to protect access to a website. An application, a network, documents, and data on a computer system can all be accessed with a password. A password should typically be comprised of something challenging to decipher so that it may be kept private. We can use our keylogger tool to approve that password.

Key Words

Keylogger, stealth, Keystroke, System, E-mail

Cite This Article

"Enhancing System Monitoring Capabilities through the Implementation of Stealthy Software – Based Keylogger: A Technical Exploration ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org), ISSN:2349-5162, Vol.11, Issue 1, page no.g446-g451, January-2024, Available :http://www.jetir.org/papers/JETIR2401653.pdf

ISSN


2349-5162 | Impact Factor 7.95 Calculate by Google Scholar

An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 7.95 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator

Cite This Article

"Enhancing System Monitoring Capabilities through the Implementation of Stealthy Software – Based Keylogger: A Technical Exploration ", International Journal of Emerging Technologies and Innovative Research (www.jetir.org | UGC and issn Approved), ISSN:2349-5162, Vol.11, Issue 1, page no. ppg446-g451, January-2024, Available at : http://www.jetir.org/papers/JETIR2401653.pdf

Publication Details

Published Paper ID: JETIR2401653
Registration ID: 532155
Published In: Volume 11 | Issue 1 | Year January-2024
DOI (Digital Object Identifier):
Page No: g446-g451
Country: Bangalore, Karnataka, India .
Area: Science & Technology
ISSN Number: 2349-5162
Publisher: IJ Publication


Preview This Article


Downlaod

Click here for Article Preview

Download PDF

Downloads

000120

Print This Page

Current Call For Paper

Jetir RMS