
1 minute read
International Journal for Research in Applied Science & Engineering Technology (IJRASET)

ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Advertisement
Volume 11 Issue III Mar 2023- Available at www.ijraset.com
Above figure displays final output log file delivered through email.
V. CONCLUSION
Keyloggers are possibly disastrous whenever permitted to carry on uncontrolled. Albeit the present working frameworks assist with identifying some fundamental malware, they will undoubtedly miss the modern and continually advancing ones. Keyloggers are utilized to incept the connection between what you type and what is shown on the screen. Programmers and other cybercriminals can utilize the data they overcome keylogging to perpetrate different cybercrime. They additionally offer your delicate information to outsiders, including publicizing organizations. It is a decent practice to have your enemy of infection and hostile to malware bought in and refreshed for a possibility In this undertaking we exhibited how keylogger's work and the way things are utilized against individuals with consent.
VI. ACKNOWLEDGEMENT
We would like to express our sincere thanks to our project guide Dr. Ravi Rastogi sir who at very discrete steps in study of this project contributed their valuable guidance to solve every problem that arose.
References
[1] R. Venkatesh and R. K. Sekhar, "User Activity Monitoring Using Keylogger," Asia Journal of Information Technology, vol. 15, no. 23, pp. 4758-4762, 2015.
[2] N. Pathak, A. Pawar, and B. Patil, "A Survey on Keylogger: A malicious Attack," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 4, no. 4, pp. 1465-1469, 2015.
[3] M. Dadkhah, M. D. Jazi, C. Ana-Maria and E. Barati, "An Introduction to Undetectable Keyloggers with Experimental Testing," International Journal of Computer Communications and Networks, vol. 4, no. 3, pp. 1-5, 2014.
[4] SURVEY ON KEYSTROKE LOGGING ATTACKS Kavya .C 1 , Suganya.R 2.
[5] Keystroke Logging (Keylogging) Tom Olzak April 2008.