How Can I Identify a Key Logger?
- Hardware key loggers are often attached to the end of the cord on computers. They are small, cylindrically shaped devices that are usually grayish in color and work by stealing data as it is typed on the keyboard. Although key loggers are virtually undetectable by software programs such as anti-virus scanners, their disadvantage is that the data must be manually downloaded by the user. This means the key logger user has to retrieve the key logger physically. You can simply remove the key logger and the device will stop recording.
- Software specifically designed to target key loggers is much more reliable in detecting them than a general anti-virus or spyware software program. Several key logger removal software programs are available online, including Anti-Keylogger, Advanced Anti Keylogger and Keylogger Detector. (See the Resources section.) As of March 2010, these programs cost from $29.99 to $39.99.
- While not 100 percent effective against key loggers, anti-spyware software programs, such as Spyzooka and Spybot Search and Destroy, are likely to detect key loggers. Once such a program is installed, just do a scan, which usually takes about 30 minutes. After it's done, the program will return a list of possible threats and ask if you want to quarantine them. Clicking "Yes" will remove them from your computer.
- Avast.com and AVG.com make combination anti-virus/anti-spyware software. These programs are both generally effective against key loggers but not 100 percent effective, mainly because some key loggers use a different type of programming in their creation than typical viruses. They offer some protection against key loggers, however, and are worth using. After the software is downloaded and installed, use it to do a complete system check. If a computer has a key logger, then it should show up in either the anti-virus or anti-spyware scans.