Sue has been the most commited employee. She is always at her duty post doing what she was being paid to do. With all the zeal and industry being exhibited by Sue and most of her colleagues, the company couldn’t explain why productivity was taking a steady and speedy decline until a consultant detective was hired.
Investigations revealed that Sue spends 70% of her -work’ sessions in dating chat rooms. Other times, she was emailing her pals and reading internet news – oh she loved the -fashion and style’ segments!
Worse case for Steve who was discovered to be trading the company’s sensitive information’s to a rival group.
How were these discoveries made since these people work alone in their closets and never share their computers?
Hardware keyloggers to the rescue!
keylogger are devices that are used to monitor the activities on a computer. It works by tracking the keystrokes, recording conversations, tracking the creation of documents and monitoring emails. This is usually achieved when a hardware circuit is attached somewhere in between the computer keyboard and the computer. They are designed in such a way that they blend with the rest of the computer cabling.
How they work
They basically interrupt the keystrokes signals and stores them away. The storage can range from 2MB, which is enough for one – week use, and up to 2GB of flash memory. Ideally, these memories can only be accessed by the individual that installed the device.
To access these memories the installer presses a combination of keys which switches the device from a keystroke-capturing mode to a usb flashdrive mode. Then you receive a message which tells you that a new usb disc drive has been located, and there you will find the keystroke logs that were collected. You also see a configuration file which you can modify in order to change the secret access key.
Hardware Keylogger are now preferred to software keyloggers. The latter can be easily detected by software scanners, and their operations are limited to a single