In the world with increasing technology the safety should also increase. The effect of malware is getting worse, studies say. There are two kinds of malware analysis listed here. Static… Click to show full abstract
In the world with increasing technology the safety should also increase. The effect of malware is getting worse, studies say. There are two kinds of malware analysis listed here. Static Malware Analysis is one, and Dynamic Malware Analysis is another. It is likely that about one out of many large companies systematically monitors the computer, internet, or email use of its user’s employees. Today, over a hundred different products are available that will allow companies to see what their customers do on their "personal" computers, in their emails, and on the internet at work. This paper, of course, aims to propose a real time working keylogger. Both keystrokes along with the screenshot of the application in which the keystrokes were entered are logged by the keylogging software and sent via an email. Using this we capture all information in text form. Security is the at most importance in the current generation and thus key logging and its other functions motivated us to take up the topic. Keywords—Malware, Detection, Hackers, Keylogger, Keystroke,
               
Click one of the above tabs to view related content.