Thursday, October 27, 2016

Concept of keylogger

Introduction to Keylogger 

If you are familiar with Computer Hacking Culture, you probably would have listen about the Term "Keylogger". Well Today in this article we will discuss this topic in detail. If you are new in the computer world, you must be thinking about two things right now:
  • What is Computer Hacking
  • What is Key Logger

Well, If you want to know about computer hacking please refer to my another article "Introduction to Computer Hacking". 

Let's talk about the main topic for now i.e. Keylogger. Well I will answer this question in a minute, I am saying this because  to understand what keylogger is one must understand its basic and logic first.

I am assuming that you already know the working of keyboard and its basic design also.

Ok, Let's begin......

We all know that every keyboard has a combination 5 types of keys:

  •  Function Keys
  • Numeric Keys
  • Alphabetical Keys
  •  Arithmetic  Keys
  • Special Keys

All these keys performs their own defined function when pressed. For Example : When you press "A" Key from the keyboard, the letter "A" is printed on the screen similarly with all the remaining keys.

This was the basic detail. In order to know the exact meaning and working of Keylogger we need to have depth knowledge of working of these keys.

Working of Keyboard Keys

You must be thinking that why I am talking about Keyboards so much , Well wait for a while you will get your answer. So, !!  are you ready to take a dive in technical ocean!!! 

First thing you need to know that computer recognize a different language than we humans do, I mean to say that Computer does not know English language or any other language it converts the human understandable language to the computer understandable form and it is called Hi level language conversion to Low Level Language Conversion.

  •  Hi Level Language is a language that is understandable by us Human Beings. For Eg. English, Hindi etc.
  • Low Level Language is a language that computer understands i.e.  Binary Language or machine language.

You must be thinking that then why letters on keyboard keys are always Printed in Hi Level Language and what is binary language and what is the need for conversion. Well, I will answer these questions of yours one by one.

  1.  If English is a human's language than Binary is a digital circuit's language. In Binary language for example The letter A is written as "01000001" and our human mind is not very good with numbers i mean to say that human mind can process alphabet more efficiently than numbers and to prove that let's take an example of letter  "A" Just close your eyes and think about letter "A" in your mind your mind will start guessing things that starts with "letter A" like an apple, or someone's name that starts with "A" example Aryan etc. it's like Google search you type something in search box and Google starts guessing things on the basis of your query. Now, Similarly Picture a number  "1" in your mind like the same way you did earlier with letter "A" you will see nothing will come into your mind. 
  2. So, This activity tells us that our mind is good with letter but not numbers and this is the reason why all the website addresses are in English language and all the keys have English or hi level language printed on our keyboard.
  3. Binary Language as i discussed before is a digital circuit's language. All the digital circuits operates on binary or machine language or Low level Language. To know more about Binary Language Please check this article.

Now, We have enough knowledge to understand the working and concept of Key logger. Now, i will answer your much awaited question.

What is Key logger

In simple language, key logger is a kind of malicious software which is used by cyber criminals to capture the victim's key strokes and save them in a secret file and then send it to the owned through a particular medium.

Working of Key logger

Suppose you are an internet banker. You make huge transactions from one bank to another in the whole day . In order to make those transactions you will have to login to your bank account online i.e. if you have your correct Login Credentials only then you will be able to manage your transactions. That means if someone knows your login credentials he/she can make transactions from your account too. 

So, the basic concept of key logging is to steal this kind of curtail information from the victim without letting them know.

A computer infected with key logger captures all the key strokes that are made by the victim from the keyboard of that particular computer in binary form and stores them in a secret storage and then sent it to the cyber criminal who created it  through internet or by other mean. 

Key Logger In your System

If key logger is installed in your system your system will start showing some of the common symptoms .

  • Delayed System Booting or starting
  • Frequent Hangs
  •  Sudden Screen flashing after particular interval of time
  •  Slow Processing
  • Delay in displaying the character after pressing key from the key board. etc.

Now, You must be thinking that how key logger sends information to the Cyber Criminal! well, if you want to know that you must have the basic knowledge of computer networks.

Computer Networks

Well, if you search on internet you will get plenty of knowledge about Computer Networks. In simple Words when two or more computers or devices connected together in order to share information through a medium is called computer networking and that "medium" is called  computer network and that medium can be anything wired or wireless or combination of both. 

It is a vast concept and will be discussed in other article, for now we will be focusing on the role of network in key logger concept.

Role of Computer Network in Key logger Concept

Key logger always works on the concept of Server Client Model of network topology i.e. a cyber criminal installs the key logger's server in his/her system and configures it to listen to a particular connection  and in same way  he/she also configures the client key logger to  send data to that particular connection silently via Computer Network.  

Modern Keylogger have become very handy and intelligent. Some of the key logger comes with automated configuration and provides the functionality of not logging the key strokes only but capturing screenshot of current window , recording voice calls and even recording net traffic also. and send the interval reports through emails also.

How it Happens

Now, Let's talk about how key logger gets into your system.

Simply, Creating or configuring key logger is easy as compared to fooling the Victim to install it on their system.  Cyber Criminal sends keylogger  through:

  •  Malicious websites
  • Patching Them in Popular Applications and upload them on the un verified websites or torrent websites or cracks or patches of Cracked Software.
  •  Malicious Advertisements
  • Through Network or Email Link.
  • Through Portable Media or Manual Installation.

Protection Measures

Yes, It is True you can also protect yourself from this kind of threats. 

  •   Update Your Operating System regularly
  •   Configure or Check your Firewall
  •   Install Internet Security Suits and Update them regularly.
  •   Do not Download Things from un trusted Source
  •   Do not click on annoying adds while surfing from un trusted source
  •   Do not Download Cracked Software
  •   Do not Download Data from Torrent Sites with making Security Measures
  •   Do not Open unknown Emails and Download attachments. Always scan before Download.

While entering critical information like login Credentials on internet  always use Virtual Keyboards because keylogger can only steal key strokes but there is no key logger is available till date which can capture mouse movements .

Things To Know

Keylogger are not only used for malicious purpose but their form of Software Key logger is used by Employers to keep an eye on their employees  to see what they are doing and these kind of keylogger are commercially available on internet.

Important Information

Keyloggers are or two types :

  •  Software Keylogger
  •  Hardware Keylogger

I have told you about software keylogger. however, Hardware Keylogger are difficult to detect in case if they are embedded in the chip of a component. But Normally they look like a USB Pen drive which can be connected in the USB Port and USB Keyboard than connected to that key logger. While Using Computer in Cyber Cafe, an intelligent person will check the USB port of keyboard to see if its directly attached to the mother board or not. if its attached directly then you can use internet on that system. 

Software Keylogger can be detected manually also. We are working on a video tutorial soon it will be uploaded on our you tube channel and shared on our social media profiles including our blog.

If you like this Article please Like share and Comment

Twitter: @cybergears25

You Tube: Cybergears

Saturday, October 22, 2016

Learn How to Type in Hindi

Language Typing

Hi! Today's post is all about language typing. If you are in the field of computer technology, typing becomes your first task in to-do list. Learn to type is not an easy job, if you are thinking that pressing keys on keyboard is called typing then your are wrong not completely but beside pressing keys on keyboard you need to have good coordination between your fingers and mind also. 

Typing English language is easy because keyboard layout is in English Language by default which helps us to figure out which key is to be pressed to type that particular letter. 
The problem usually comes when you want to type in different language on an English keyboard or in other language keyboard. Typing becomes an issue in this case and learning different language on different keyboard layout becomes difficult for most of the people. 

But don't worry i have specially compiled this article to help those people who think typing a different language on a different keyboard layout is difficult.

Hindi Language Typing

Hindi is the preferred language of  India and it is a difficult language to type in English Keyboard because memorizing every key is a difficult job. 

You can type in Hindi language by the following ways:
  • Take Hindi Typing Classes
  • Use Hindi Keyboard Stickers
  • Download a Typing software etc.
  • Use online Hindi Typing Keyboard (Quila pad)
All these options are good but you will have to spent money and time to become proficient in Hindi language typing. But do not worry i have bring you a way to learn to type in hindi for free without  any Software or online typing pad.

Learn How Type  in Hindi in 2 Minutes.

You must be thinking that how is it possible, well yes, it is possible in fact i have compiled a tutorial  for you!!. 
Shall we begin..!!
Every language needs a keyboard layout to type letters in the text editor or word processor. So our Step One will be to install Hindi keyboard layout.

STEP 1  ⇒ Go To Start ⇒ Control Panel 

Cybergears - itguyinside, - Learn How to Type Hindi in 2 Minutes 

 STEP 2  ⇒ Open Region and Language -

STEP 2  ⇒ Go to Keyboards and Languages ⇒ Change Keyboards

STEP 3  ⇒ Add ⇒ Select Hindi Layout ⇒ Press OK ⇒ Press Apply ⇒ Close all Windows

NOTE: If hindi language is already listed in the big box then you need to skip this step otherwise follow the step. -

After selecting language script and pressing OK you will able to see the Hindi Language listed below English language in the box as shown below:

 STEP 4⇒Open Text Editor or Word Processor⇒Press win key + R  ⇒ Type osk and Hit Enter -
After Pressing OK you will see On Screen Keyboard on your screen and then - - @cybergears25
The Keyboard is in English Layout now all we have to do is change its layout to hindi.

Final Step  ⇒ Press Alt + Shift Key 

Alt + Shift Key is a combination to switch language layout if more than one layout is installed . To change layout back to English you will have to Tap Alt + Shift Key again.

I have also created a nice video tutorial if you want you can see the video below.

and in the last if you like my tutorial please subscribe us on you tube and facebook and twitter and Do not forget to like and comment. 
 Have a look on another article on Cyber Awareness and Effects of social media on our lives
Thank you

Twitter: @cybergears25
You Tube: Cybergears

Tuesday, October 18, 2016

Effects of Social Media on our lives

Now a days the life has become very easy and the credit goes to Information Technology. Now we can stay connected to our loved ones even if we are 1000 miles away from them. We can see what is happening around the world while sitting in one place and the credit goes to social media.

Social media has become a vital part of our lives. We use Social media to share our emotions whether we are sad, happy or angry. Social media helps us to connect to the world and with our loved ones.
The best services being offered in the social media are facebook, twitter, youtube etc. All of these companies offers a verity of features  which makes them best in the field.
 However, besides its many advantages there are some disadvantages of social media also.
  • Risk of hacking
  • Risk of identity theft
  • Risk of Personal content leak etc.
SO, if you are a social media user, use it with a caution.

Thanks for Reading..

Monday, October 17, 2016

Introduction to Computer Hacking

This Article is for Educational Purpose.

This article is dedicated to spread the awareness of Cyber Crime. 
Internet is a place of Opportunities. It offers many things like Knowledge, Entertainment, Fun etc. Internet has made our lives  very easy and comfortable and the best thing about internet is the worst thing also. Internet enables us to access the huge amount of information, which is a good thing but the information it provides is uncontrolled which makes it a worst thing also.


            With the rise of computer technology a new level of crime has also been started.  If you are a user of internet, you may have heard the term "Hacking" somewhere. Have you ever wonder what it is and what are its effects on our lives. 
Hacking is a vast domain of its own and whenever we talk about hacking we also hear the term Cracking 

Hacking vs Cracking


If you search on internet you will find plenty of information about these two. Hacking and cracking are both misinterpreted words by main stream media. Some people consider hacking as a crime and some consider cracking as a crime. 
            Well technically, hacking is a process to create something new and it can be anything like software, hardware, website etc. 

            Cracking on the other hand is the process of forcing a system or software or hardware etc. to do the things which it is not designed to do.
            So, if you have ever created something innovative which have never been created before by anyone then you are a hacker. for example Mark Zukerburg created facebook so he is a Computer Hacker.
            On the other hand The Well known Security Researcher Kevin Mitnick found a way to make free calls from phone makes him a cracker because he forced the Phone Lines to do something that they were never designed to do.

Cyber Crime 

            It requires the knowledge of both Hacking and Cracking to do a perfect and intense cyber crime.But the question arises, What is cyber crime?? The answer is simple: 
  • Threatening people on internet is a Cyber Crime
  • Impersonating someone's Identity on internet is a Cyber Crime.
  • Uploading Trojan Horse to the internet is a cyber crime
  • Cracking software license is a cyber crime
  • Downloading copyright content for free is a cyber crime
  • Downloading someone's personal images, videos etc. from the internet is a cyber crime.
The are lot more Types of cyber crimes because Its a very vast domain.

How it Works 


Well, Computer Hacking/Cracking is not a easy job to do. It requires intense knowledge of various fields of Computer, Internet and the Target.

       Cyber Crime is like Catching a Fish. Here, The cyber criminal is the Fisherman and the fishing rod is the Trap and fish are you and how he uses that rod is the skills of Fisherman or Cyber Criminal.
        One important Thing to know about the Hacking/cracking is that it is harmless until you have not entered yourself into the trap. So, we have an advantage here that if we know how hacking works we can save our self but mostly, the people with lack of basic knowledge of internet and computers are the victims of hacking

We will discuss all about these hacking traps and how to save yourself from these traps in the next post.

Internet is a dangerous thing so use it with a caution.
Please stay connected. Like comment and share