SlideShare a Scribd company logo
BY GANESHDEV CHAVHAN
THIRD YEAR COMPUTER ENGINEERING
ROLL NO 20140608
SUPPORTED AND GUIDED BY MR. ROSHAN KOTKONDWAR
SPYWARE AND
KEY-LOGGERS
Dr. Bababsaheb Ambedkar Technological
University, Lonere.
AGENDA
Spyware
1. What is Spyware ?
2. The Beginning ..
3. How to detect ?
4. How to protect ?
5. Advantages and Dis-advantages.
Key-loggers
1. Key-loggers ?
2. Types
3. Example and Uses:
4. Live Demo:
5. How to defend?
What is Spyware ?
Spy- ware =Spying Software
 Basically spyware deals with computers and
internet.
Like spying remotely on someone using there
own computer without their acknowledgement
 "Spyware" is mostly classified into four types: system
monitors, Trojans, adware, and tracking cookies. Spyware is
mostly used for the purposes of tracking and storing Internet
users' movements on the Web and serving up pop-up ads to
Internet users.
THE BEGINNING…
The word 'spyware' was used for the first time publicly in October
1995.
It popped up on Usenet (a distributed Internet discussion system
in which users post e-mail like messages) in an article aimed at
Microsoft's business model.
How To Detect ?
 Loading time of your PC
 Startup Programs
 Auto Homepage Setting
 Pop-ups
?
 Ad-ware
 Survey
 Data gathering
 Parental Control Software
 Ethical Hacking
ADVANTAGES
DIS-ADVANTAGES
 Slower Computer
 Unwanted Data
 Useless and Vulgar Pop-Ups
 Privacy
Key-Logger ?
TYPES
Hardware Based Software Based
Examples and Usage
1. Best Key-logger
2. Actual key-logger
3. Perfect Key-logger
4. Hardware based Key-loggers.
5. MyJad Key-logger and many
How to Defend ?
 Do not use freeware like C-cleaner or any Speedup Software
 Don’t install unwanted application or 3rd Party Applications
 Don’t visit or click on pop-ups
 Always Check startup menu and remove unwanted
Source:
• http://www.softnic.com
• http://www.spy-blog.blogspot.in
• http://www.9dot9.com
Special Thanks to:
• MS-Office and Photoshop
• Freeware's.
Any Questions ?
Spyware and key loggers

More Related Content

PDF
Spyware
PPTX
Spyware by Sahibe Alam
PPT
Spyware
PPTX
Spyware presentation by mangesh wadibhasme
PPT
Spyware
PPT
Viruses Spyware and Spam, Oh My!
PPTX
spyware
Spyware
Spyware by Sahibe Alam
Spyware
Spyware presentation by mangesh wadibhasme
Spyware
Viruses Spyware and Spam, Oh My!
spyware

What's hot (20)

PDF
DEFINING A SPYWARE
PPT
spyware
PPTX
spyware
PPTX
PPT
Spyware and adware
PPT
Spyware report
PPT
Spyware
PDF
What Is Spyware?
PPTX
Spyware powerpoint
PPT
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
PPT
Spyware
PPTX
Spyware-A online threat to privacy
PPT
Spyware Adware1
PPT
S P Y W A R E4 S I K
PPTX
Introduction to Malwares
PPTX
MALWARE AND ITS TYPES
PPTX
IT viruses
PPT
Spyware And Anti Virus Software Presentation
DEFINING A SPYWARE
spyware
spyware
Spyware and adware
Spyware report
Spyware
What Is Spyware?
Spyware powerpoint
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware
Spyware-A online threat to privacy
Spyware Adware1
S P Y W A R E4 S I K
Introduction to Malwares
MALWARE AND ITS TYPES
IT viruses
Spyware And Anti Virus Software Presentation
Ad

Viewers also liked (9)

PPTX
spyware
PPT
PPTX
Common malware and countermeasures
PPT
Keyloggers and Spywares
PPT
Threats, Vulnerabilities & Security measures in Linux
PPS
introduction to malwares,virus,trojan horse
PPTX
Long Term Success with Reddit - Pubcon 2015
PPTX
Understanding Reddit: The Social Media Superpower You've Probably Never Heard Of
PDF
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
spyware
Common malware and countermeasures
Keyloggers and Spywares
Threats, Vulnerabilities & Security measures in Linux
introduction to malwares,virus,trojan horse
Long Term Success with Reddit - Pubcon 2015
Understanding Reddit: The Social Media Superpower You've Probably Never Heard Of
The New Assembly Line: 3 Best Practices for Building (Secure) Connected Cars
Ad

Similar to Spyware and key loggers (20)

PPTX
What is Malware (Virus), Types of Malware
PPTX
What is Malware (Antivirus)
PPTX
Computer Virus
PPTX
Computer virus and anti virus presentation
PDF
Survey on Malware Detection Techniques
PDF
Analysis of virus algorithms
PPTX
Presentation_malware_anti_malware.pptx
PDF
malwareanti-malware-160630191004 (1).pdf
PPTX
Malware & Anti-Malware
PPTX
Computer Malware Into
PPTX
Detecting and mitigating cyber threats and attacks1
PPT
Computer infections and protections(final)
PDF
Eh34803812
PPTX
Computer warms viruses trojans and its prevention
PDF
Cyber Malware Programs And The Internet
PPTX
(Training) Malware - To the Realm of Malicious Code
PDF
Identifying, Monitoring, and Reporting Malware
PPTX
MALWARE
PDF
Security concepts to consider when using a computer
PDF
Threats of Computer System and its Prevention
What is Malware (Virus), Types of Malware
What is Malware (Antivirus)
Computer Virus
Computer virus and anti virus presentation
Survey on Malware Detection Techniques
Analysis of virus algorithms
Presentation_malware_anti_malware.pptx
malwareanti-malware-160630191004 (1).pdf
Malware & Anti-Malware
Computer Malware Into
Detecting and mitigating cyber threats and attacks1
Computer infections and protections(final)
Eh34803812
Computer warms viruses trojans and its prevention
Cyber Malware Programs And The Internet
(Training) Malware - To the Realm of Malicious Code
Identifying, Monitoring, and Reporting Malware
MALWARE
Security concepts to consider when using a computer
Threats of Computer System and its Prevention

Recently uploaded (20)

PPTX
t_and_OpenAI_Combined_two_pressentations
PPT
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
PPTX
Introduction to cybersecurity and digital nettiquette
PPT
250152213-Excitation-SystemWERRT (1).ppt
PPTX
Internet Safety for Seniors presentation
PDF
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
PPTX
Power Point - Lesson 3_2.pptx grad school presentation
PPTX
Mathew Digital SEO Checklist Guidlines 2025
PPTX
artificialintelligenceai1-copy-210604123353.pptx
PPTX
Database Information System - Management Information System
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PPTX
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
PDF
Introduction to the IoT system, how the IoT system works
PPT
Ethics in Information System - Management Information System
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPTX
Layers_of_the_Earth_Grade7.pptx class by
t_and_OpenAI_Combined_two_pressentations
415456121-Jiwratrwecdtwfdsfwgdwedvwe dbwsdjsadca-EVN.ppt
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Introduction to cybersecurity and digital nettiquette
250152213-Excitation-SystemWERRT (1).ppt
Internet Safety for Seniors presentation
Smart Home Technology for Health Monitoring (www.kiu.ac.ug)
Power Point - Lesson 3_2.pptx grad school presentation
Mathew Digital SEO Checklist Guidlines 2025
artificialintelligenceai1-copy-210604123353.pptx
Database Information System - Management Information System
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Slides PPTX: World Game (s): Eco Economic Epochs.pptx
Introduction to the IoT system, how the IoT system works
Ethics in Information System - Management Information System
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Layers_of_the_Earth_Grade7.pptx class by

Spyware and key loggers

  • 1. BY GANESHDEV CHAVHAN THIRD YEAR COMPUTER ENGINEERING ROLL NO 20140608 SUPPORTED AND GUIDED BY MR. ROSHAN KOTKONDWAR SPYWARE AND KEY-LOGGERS Dr. Bababsaheb Ambedkar Technological University, Lonere.
  • 2. AGENDA Spyware 1. What is Spyware ? 2. The Beginning .. 3. How to detect ? 4. How to protect ? 5. Advantages and Dis-advantages. Key-loggers 1. Key-loggers ? 2. Types 3. Example and Uses: 4. Live Demo: 5. How to defend?
  • 3. What is Spyware ? Spy- ware =Spying Software  Basically spyware deals with computers and internet. Like spying remotely on someone using there own computer without their acknowledgement  "Spyware" is mostly classified into four types: system monitors, Trojans, adware, and tracking cookies. Spyware is mostly used for the purposes of tracking and storing Internet users' movements on the Web and serving up pop-up ads to Internet users.
  • 4. THE BEGINNING… The word 'spyware' was used for the first time publicly in October 1995. It popped up on Usenet (a distributed Internet discussion system in which users post e-mail like messages) in an article aimed at Microsoft's business model.
  • 5. How To Detect ?  Loading time of your PC  Startup Programs  Auto Homepage Setting  Pop-ups
  • 6. ?
  • 7.  Ad-ware  Survey  Data gathering  Parental Control Software  Ethical Hacking ADVANTAGES
  • 8. DIS-ADVANTAGES  Slower Computer  Unwanted Data  Useless and Vulgar Pop-Ups  Privacy
  • 11. Examples and Usage 1. Best Key-logger 2. Actual key-logger 3. Perfect Key-logger 4. Hardware based Key-loggers. 5. MyJad Key-logger and many
  • 12. How to Defend ?  Do not use freeware like C-cleaner or any Speedup Software  Don’t install unwanted application or 3rd Party Applications  Don’t visit or click on pop-ups  Always Check startup menu and remove unwanted
  • 13. Source: • http://www.softnic.com • http://www.spy-blog.blogspot.in • http://www.9dot9.com Special Thanks to: • MS-Office and Photoshop • Freeware's.