Keystrokeinspector (Synopsis)
Keystrokeinspector (Synopsis)
Keystrokeinspector (Synopsis)
ON
Keystroke Inspector
BACHELOR OF TECHNOLOGY
IN
SUBMITTED BY:-
Parvaiz Ahmad Raina
20-B-CSE-14006
Under the guidance of
Mr. Jasdeep Singh
Mr. Sahilpreet Singh
Professor Department Of Computer Science
1. Introduction------------------------------------------------------------------------------------------------------2
2. Literature---------------------------------------------------------------------------------------------------------3
4. Objectives--------------------------------------------------------------------------------------------------------5
5. Hardware Requirements---------------------------------------------------------------------------------------6
6. Software Requirements----------------------------------------------------------------------------------------7
8. Reference----------------------------------------------------------------------------------------------9
INTRODUCTION
Keystroke logging, also known as keylogging, is simply tracking the keys that are struck on
a keyboard. This can be done in multiple ways using a wide variety of hardware devices or
software. The reason for its large threat to networks and their security is due to its covertness
4 Chandigarh Polytechnic College nature. Most keyloggers show no signs of any intrusion
within the system allowing for them to gain typed information without anyone having
knowledge of its actions except for the user who installed it. With the proper keylogger
installed on the correct machine a person could easily gain access to a company9s entire
network infrastructure. In terms of system critical data or extremely privileged information
this could cause problems for a vast amount of people very quickly.
I) Monitoring employees-Keyloggers are very much used in offices to monitor the activities
of the employees. This is basically done to ensure the employees are using the company’s
resources as intended.
II) Monitoring Kids--Keyloggers are very much used in offices to monitor the activities of
the Kids or teenagers, it can keep a record of their activity .
III) Ethical Hacking-We can use a keylogger on our personal computer to understand how it
actually works and what mistakes we need to avoid in order to prevent our self from getting
into trap.
Literature
A keylogger is a software or hardware tool that records keystrokes on a computer, often
covertly. While they can have legitimate uses, such as monitoring computer activity or
enhancing security, they also pose serious privacy and security risks when used maliciously.
Detecting and preventing keyloggers is crucial to safeguarding personal and sensitive
information.
We need computer resources with sufficient hardware and the tools installed in.
This key logger will be software based program where people can use this for their study
purpose or monitoring there system use. Since it is a software application an IDE will be used
in order to write code and to run them. Among these tools, we need to install latest version of
python in our computers. With the help of these tools, it is possible to implement a keylogger
to a system and maintain a log of pressed keys. In addition to these tools, the language we
will use is Python . Some other required software are :-