Old versionsSee all
In all program keyloggers, the number of methods for getting information about keys you press is limited. There are two basic principles of keyloggers:
Hook based keyloggers;
Kernel based keyloggers.
Hook based keylogger is the most prevailing type of keyloggers, since this method is very easy-to-realize. By the program’s request, Windows informs it about every key you press.
Kernel-based keyloggers work with the help of user-written keyboard drivers. This method is applied extremely rarely, since it requires high level of proficiency from the developer of the keylogger.
In terms of these keyloggers’ vulnerabilities, the second version of the Keylogger Hunter was created, which paralyzes accumulation of information by Hook-based keyloggers. This program is neither a detector, nor a disabler of keyloggers; it paralyzes the principle of keylogger functioning, based on Hooks. That is to say, the program (working in real-time mode) deletes Windows’ information about pressed keys, which can be captured by Hook-based keyloggers. The result of such process is an empty file of the keylogger, which by no means can contain data about pressed keys.
Use of Keylogger Hunter allows you to be less dependent on freshness and completeness of the antivirus database, which can possibly contain no information about a rare version of a keylogger.
Thus, you have an opportunity to install on your computer and use a special program, which would play a role of a “second echelon” for your data security.