SlideShare a Scribd company logo
Client Requirement
Malware today are so advanced that they can be programmed to silently absorb information
via recording key logging. Customer requested a real time encrypting software to safeguard
users’ applications and computers from malicious software trying to sneak information by
recording key press information.
Client’s specific requirements for the software were:
 An interface that allows users to view real time encryption.
 The application must act as defense layer between the kernel and destination app.
 A cryptology technology that can fight the toughest malware.
 Should not be very resource intensive.
 Automatic version control facilities.
 Three different version support – Trial, Pro and Premium.
 Supports maximum applications including browsers and chat applications.
 Should function when a user logs on to Windows locally or logs on to the domain.
With such stringent requirements, we created a state-of-the-art cryptography software that
safeguards user’s applications from malware. This software effectively secures application
credentials and defeats key loggers by encrypting key strokes at the keyboard driver level. The
software is deeply rooted in the system and key loggers cannot bypass the encryption or
decode it.
The application was built to work seamlessly with several authentication programs and along
with providing stringent security and privacy methods, also offers easy software installation.
Challenges
The team faced the following challenges:
 Developing a driver to support functionalities of the keyboard that support customized
encryption for all keystrokes.
 The driver needed to be loaded to memory without any system crashes.
 Driver needed to load at machine start and the driver needed kernel level drive
programming.
 Flawless application operation by speeding up at all interfaces and instances.
 Providing the application with foolproof encryption logic so that the system is non hack
able.
 Securing the interaction between server and application.
 Focus on control and making the application work accurately.
Technologies Used
Operating System &
Server Management
Windows OS, Multi-Server Architecture with Staging & Production
Environment through Version Controlling releases, Server
Optimization, Security & SSL Implementation, Scheduler for Back-
ups, Alert Monitoring System Integration, Server Performance
Tuning at regular intervals, Software Firewall Configuration &
Maintenanc.
Development Tools and
Environment
Windows DDK, C, Microsoft Visual Studio, VC++, MFC, NSIS,
.NetFramework 4.0 etc.
Database MSSQL Database Server, DB Clustering, DB Optimization, Master
Slave Replication, Query Optimization, Scheduler for Backups
Manpower
Developers 3
Designers 1
Quality Assurance Testers 1
Planning
In order to incorporate the numerous features and functionalities, the following development
approach was used:
 Usage of high level security and data fetching technology.
 Scheduled research and analysis for desired output for different business verticals.
 High level coding standards followed for managing backup volume. Synchronization with
server for the most recent updates was also taken into consideration.
 Current and newly available data had to be in sync for backup.
 The GUI for the software and website needed to be planned.
Driver Architecture
Application Architecture
Development Highlights
The application was made compatible with Windows XP, Vista and Windows 7 operating
systems. The entire application was developed with C, assembly language, VC ++ and .Net
Framework 4.0. The screens were designed with UML diagram and basic framework integrated
for high performance of the application. .Net framework and core graphics were used to
develop almost all modules. Wireframes were developed for each dialog box and integrated
with UML diagram. Driver module had a complex structure to allow successful communication
between driver and user mode applications. Kernel level programming enabled that application
to work flawlessly without crashes and memory leaks. A light version installer was used for the
application. Over all performance was enhanced by the use of high resolution images with low
memory usage. Customized installer was used to enable command line parameters. The
application was developed and live in a span of 10 months.

More Related Content

PDF
Anti key logging and real-time encrypting software | keystrokes encrypting so...
PPTX
Presentation web based application|Web designing training center in coimbator...
DOCX
PPT
Overview of asp .net
PDF
Eventum Presentation
PDF
Reasons behind selenium automation testing popularity
PDF
IBM_WebSphere_05_23_00_PM
PDF
Securing the PHP Environment with PHPSecInfo
Anti key logging and real-time encrypting software | keystrokes encrypting so...
Presentation web based application|Web designing training center in coimbator...
Overview of asp .net
Eventum Presentation
Reasons behind selenium automation testing popularity
IBM_WebSphere_05_23_00_PM
Securing the PHP Environment with PHPSecInfo

What's hot (20)

PDF
Mobile application development
DOCX
resume
PPTX
The Advantages of ReactJS in Application Development
PPTX
Windows 10 Migration
PDF
Top advantages of using laravel php framework
ODP
Synapse india complaints on secure web applications
DOC
Akash Srivastava
PPTX
Dealing with complexities of Windows 10 migration
PPTX
Joomla Features
PDF
The story of SonarQube told to a DevOps Engineer
PDF
Learn .net and develop the web applications
PDF
Skills required to start your Software Testing Engineer Career
PPTX
Technource - Zend framework Developers India
PDF
Ibm web sphere application server nd v8.0
PPTX
MVC & CodeIgniter
PPTX
Our law android application
PPTX
Windows 8 & Phone 8 - an Architectural Battle Plan
PPTX
Windows Phone 7 Architecture Overview
DOCX
SSE_Garcia_Dennis_RES_2016
PPTX
Selenium WebDriver
Mobile application development
resume
The Advantages of ReactJS in Application Development
Windows 10 Migration
Top advantages of using laravel php framework
Synapse india complaints on secure web applications
Akash Srivastava
Dealing with complexities of Windows 10 migration
Joomla Features
The story of SonarQube told to a DevOps Engineer
Learn .net and develop the web applications
Skills required to start your Software Testing Engineer Career
Technource - Zend framework Developers India
Ibm web sphere application server nd v8.0
MVC & CodeIgniter
Our law android application
Windows 8 & Phone 8 - an Architectural Battle Plan
Windows Phone 7 Architecture Overview
SSE_Garcia_Dennis_RES_2016
Selenium WebDriver
Ad

Viewers also liked (8)

PDF
Sr Gl Cafe
PDF
Referencias
PDF
Datalink Support Services Overview
PPT
NetvæRksgruppe Strategi
DOC
Flyer Summer Love
PPT
PDF
Search Engine And Toolbar With A Chance To Win Prizes
PPT
Benefits of PHP web development
Sr Gl Cafe
Referencias
Datalink Support Services Overview
NetvæRksgruppe Strategi
Flyer Summer Love
Search Engine And Toolbar With A Chance To Win Prizes
Benefits of PHP web development
Ad

Similar to Anti Key Logging And Real Time Encryption Software (20)

DOC
BruceRamsland_Resume_12282015
PDF
Sarah CV 2016 External
PDF
Graphical Password Authenticationimp.docx2
PDF
Cv 7830388-81894-rizwan-farooq
PPTX
Ami device driver_services ver. 1.1
PDF
Information Management System on .NET for a Consumer Services Company
DOCX
Work example2 detailed
PPT
Sanctuary Device Control
DOCX
CV Dejan
PDF
Thick Application Penetration Testing - A Crash Course
PDF
CV - Mohsan Raza Ali - Development Manager
DOCX
Software Requirement Specification - Software Pack Solution 14
DOC
sathishkumarr
DOCX
Resume_AbinashMohanty
PDF
SE.Software design Data Intensive system lecture 5c.pdf
DOC
Resume - Timothy Williamson
PPTX
File encryption decryption
DOC
Gajendra_RESUME
PPT
Security architecture
PDF
Resume2_Roy Anderson_online version
BruceRamsland_Resume_12282015
Sarah CV 2016 External
Graphical Password Authenticationimp.docx2
Cv 7830388-81894-rizwan-farooq
Ami device driver_services ver. 1.1
Information Management System on .NET for a Consumer Services Company
Work example2 detailed
Sanctuary Device Control
CV Dejan
Thick Application Penetration Testing - A Crash Course
CV - Mohsan Raza Ali - Development Manager
Software Requirement Specification - Software Pack Solution 14
sathishkumarr
Resume_AbinashMohanty
SE.Software design Data Intensive system lecture 5c.pdf
Resume - Timothy Williamson
File encryption decryption
Gajendra_RESUME
Security architecture
Resume2_Roy Anderson_online version

More from Grey Matter India Technologies PVT LTD (20)

PDF
Joomla CMS system's Features
PDF
Microsoft dynamic CRM Development
PDF
The Best features of new Andoid Nougat
PPT
Some Known Facts About WordPress
PPT
Boost up Sales & Maximize Revenue in your Online Business With Magento Multi ...
PPT
Ways To Use Your Android Smartphone More Efficiently
PPT
The Mobile App Development Look Like in 2016
PPT
iOS Features To Include When Developing IPhone Application
PPT
How ASP.NET MVC Implementation Help Enterprise Web Application Development?
PPT
Top Qualities of Successful Mobile Apps In Startup Tech Company
PPT
Which Is Better – An App or A Mobile Website?
PPT
The Battle Of The Web - PHP OR ASP.NET
PPT
Important Facts For Developing An Ecommerce Portal
PDF
Top 5 Benefits Of Hiring PHP Development Company
PPT
Top 13 Web Development Trends And Predictions For 2015
PPT
Top 9 Features Of a Successful Android Application
PPT
Benefits and Drawbacks of Outsourcing Software development
PPT
Top Reasons Why PHP Will Conquer The World
PPT
Top 10 Factors To Look Before Hiring Software Development Company
PPT
Benefits of Choosing DotNet for Enterprise Application Development
Joomla CMS system's Features
Microsoft dynamic CRM Development
The Best features of new Andoid Nougat
Some Known Facts About WordPress
Boost up Sales & Maximize Revenue in your Online Business With Magento Multi ...
Ways To Use Your Android Smartphone More Efficiently
The Mobile App Development Look Like in 2016
iOS Features To Include When Developing IPhone Application
How ASP.NET MVC Implementation Help Enterprise Web Application Development?
Top Qualities of Successful Mobile Apps In Startup Tech Company
Which Is Better – An App or A Mobile Website?
The Battle Of The Web - PHP OR ASP.NET
Important Facts For Developing An Ecommerce Portal
Top 5 Benefits Of Hiring PHP Development Company
Top 13 Web Development Trends And Predictions For 2015
Top 9 Features Of a Successful Android Application
Benefits and Drawbacks of Outsourcing Software development
Top Reasons Why PHP Will Conquer The World
Top 10 Factors To Look Before Hiring Software Development Company
Benefits of Choosing DotNet for Enterprise Application Development

Recently uploaded (20)

PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
MYSQL Presentation for SQL database connectivity
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Spectroscopy.pptx food analysis technology
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
The Rise and Fall of 3GPP – Time for a Sabbatical?
MYSQL Presentation for SQL database connectivity
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
A comparative analysis of optical character recognition models for extracting...
Per capita expenditure prediction using model stacking based on satellite ima...
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf
Encapsulation_ Review paper, used for researhc scholars
Big Data Technologies - Introduction.pptx
Spectroscopy.pptx food analysis technology
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
Assigned Numbers - 2025 - Bluetooth® Document
Spectral efficient network and resource selection model in 5G networks
Digital-Transformation-Roadmap-for-Companies.pptx

Anti Key Logging And Real Time Encryption Software

  • 1. Client Requirement Malware today are so advanced that they can be programmed to silently absorb information via recording key logging. Customer requested a real time encrypting software to safeguard users’ applications and computers from malicious software trying to sneak information by recording key press information. Client’s specific requirements for the software were:  An interface that allows users to view real time encryption.  The application must act as defense layer between the kernel and destination app.  A cryptology technology that can fight the toughest malware.  Should not be very resource intensive.  Automatic version control facilities.  Three different version support – Trial, Pro and Premium.  Supports maximum applications including browsers and chat applications.  Should function when a user logs on to Windows locally or logs on to the domain. With such stringent requirements, we created a state-of-the-art cryptography software that safeguards user’s applications from malware. This software effectively secures application credentials and defeats key loggers by encrypting key strokes at the keyboard driver level. The software is deeply rooted in the system and key loggers cannot bypass the encryption or decode it. The application was built to work seamlessly with several authentication programs and along with providing stringent security and privacy methods, also offers easy software installation.
  • 2. Challenges The team faced the following challenges:  Developing a driver to support functionalities of the keyboard that support customized encryption for all keystrokes.  The driver needed to be loaded to memory without any system crashes.  Driver needed to load at machine start and the driver needed kernel level drive programming.  Flawless application operation by speeding up at all interfaces and instances.  Providing the application with foolproof encryption logic so that the system is non hack able.  Securing the interaction between server and application.  Focus on control and making the application work accurately. Technologies Used Operating System & Server Management Windows OS, Multi-Server Architecture with Staging & Production Environment through Version Controlling releases, Server Optimization, Security & SSL Implementation, Scheduler for Back- ups, Alert Monitoring System Integration, Server Performance Tuning at regular intervals, Software Firewall Configuration & Maintenanc. Development Tools and Environment Windows DDK, C, Microsoft Visual Studio, VC++, MFC, NSIS, .NetFramework 4.0 etc. Database MSSQL Database Server, DB Clustering, DB Optimization, Master Slave Replication, Query Optimization, Scheduler for Backups
  • 3. Manpower Developers 3 Designers 1 Quality Assurance Testers 1 Planning In order to incorporate the numerous features and functionalities, the following development approach was used:  Usage of high level security and data fetching technology.  Scheduled research and analysis for desired output for different business verticals.  High level coding standards followed for managing backup volume. Synchronization with server for the most recent updates was also taken into consideration.  Current and newly available data had to be in sync for backup.  The GUI for the software and website needed to be planned.
  • 5. Application Architecture Development Highlights The application was made compatible with Windows XP, Vista and Windows 7 operating systems. The entire application was developed with C, assembly language, VC ++ and .Net Framework 4.0. The screens were designed with UML diagram and basic framework integrated for high performance of the application. .Net framework and core graphics were used to develop almost all modules. Wireframes were developed for each dialog box and integrated with UML diagram. Driver module had a complex structure to allow successful communication between driver and user mode applications. Kernel level programming enabled that application to work flawlessly without crashes and memory leaks. A light version installer was used for the application. Over all performance was enhanced by the use of high resolution images with low memory usage. Customized installer was used to enable command line parameters. The application was developed and live in a span of 10 months.