Tag Archives: virus

How to find if there is a keylogger installed on your computer

A keylogger is a software application designed for spying on your activities. These applications record keystrokes made on the keyboard and transmit this data to the developer of the key logger. This way sensitive information such as usernames, passwords and banking details can be obtained by hackers and used for nefarious purposes. Key loggers can also be used to keep track of the websites you visit, your online chat room conversations, etc. If you believe that someone is spying on you, you can check your computer for key loggers. Detecting key loggers is not very difficult. All you need is a good antivirus software application installed on your computer. This blog post, I will explain about ways to detect key loggers installed on your computer.


To detect software key loggers

Install a good antivirus application on your computer and conduct a thorough search. You can also install a good spyware removal tool such as Spybot Search & Destroy for detecting key loggers. Most key loggers can be detected by antivirus/anti-spyware scanners. If you detect any malicious applications on your computer using these scanners, simply delete them or quarantine them. These applications can no longer monitor their activities.

If you do not have a good antivirus software installed on your computer, you will be vulnerable to viruses and other nasties. For this reason, it is advisable to have a good antivirus software installed on your computer. You should also regularly update it with the latest virus signatures. I would recommend Avira and Avast. These are the best free antivirus scanners available today. It is also a good idea to purchase subscriptions to antivirus software because it will be more advantageous and beneficial in protecting your security.

There are also certain scanners designed specifically to detect and remove key loggers. Though not necessary, these can be a good option especially if you feel that you’re particularly vulnerable to spying. You can run a search in Google to find some good anti-key logger software. However, I personally feel that these are not necessary. A good antivirus scanner such as Avira or Avast will normally do the job.

To detect hardware key loggers

They are also hardware key loggers but these are rarely used. These are normally connected to the keyboard cord connecting to the computer. If you believe that someone might have installed a hardware key logger to track your activities, you can check the keyboard cord for a small cylindrical device. You find something that matches this description, just remove it and it will no longer be able to record your activities.

Is your computer part of a botnet?

Even today many people are not aware about computer security. In fact, the vast majority of computers out there are insecure and open to virus attacks. When compared to a few years ago, the situation is far better now. However, it is still not where it has to be. Many computers are vulnerable because they do not have a good antivirus application installed. Many people also do not install updates and patches which makes their computers vulnerable to virus and spyware attacks. Many people do not take computer security seriously. The think that it is something that only companies have to bother about. However, since we use computers for everything in our lives these days, is very important to take measures to make your computers more secure.

The way in which we use computers has changed significantly in recent years. Earlier it used to be only desktops and laptops. However, now tablets and mobile phones have become more popular and have in fact surpassed desktops and laptops in numbers. With this transition, virus and spyware developers have also changed their targets. Surfing the Internet on any kind of device is dangerous if you do not have antivirus installed. As antivirus applications are becoming more and more stronger, virus writers are coming up with more potent malware to defeat these measures and infect computers.

The main problem with computer security threats is that often they are invisible. Some viruses are visible and can be detected easily. However, many malware are invisible and run in the background. Some malware are so well designed that even some virus scanners are also not able to detect them. Some malware called Trojan horses collect information about your activities and transmit them to third parties. This way, crucial information such as your banking passwords, credit card numbers and e-mail credentials can be transmitted to hackers who can misuse them. There are also certain malware that turn your computer into a zombie. Your computer, along with many other such compromised computers can be used for nefarious purposes such as sending spam or conducting denial service attacks against websites or networks.


A botnet is a collection of computers that are compromised and working for the same purpose. Botnets are controlled remotely by hackers. Usually, the purpose of a botnet is to conduct denial service attacks or send spam mails. Using the compromised computers of the botnet, the hacker can send a very large number of requests to a website or a network which will slow it down. Likewise, it is also possible to send a large number of e-mails using these compromised computers. Since the number of computers is very large, it is somewhat difficult to block the computers that are sending these e-mails. Thus, botnets can be used to send a large number of spam mails at once.

There are many ways to know if your computer is compromised and is a part of a botnet. If you have a good antivirus scanner installed on your computer, it may usually be sufficient to not only prevent your computer from getting infected in the first place but also detect infections. If your computer is showing high resource consumption even when it is in idle, it can be indication that something is wrong. It could most probably be a virus that is consuming the resources.

The best way to protect yourself is to install an antivirus application, a spyware removal tool and a good firewall. You should also regularly install all the updates and patches as and when they become available. It is also a good idea to avoid pirated software. When you download anything from the Internet, you should always scan it before opening. If you follow these simple security measures, it is often sufficient to protect yourself.