1.远程访问木马:
这种远程访问特洛伊木马的流行在2000年代有所增加。在此期间,人们对这种病毒如何在互联网上传播以及什么是防病毒没有足够的了解。怀疑有某些类型的远程访问木马。危险的部分是它可能在没有任何知识的情况下使用。例如,第7小节提供了一个界面,攻击者可以轻松地窃取密码,甚至更多。
2. KeyLogger :
它是设计用来记录用户进行的击键的软件。这是看似无害的最基本的软件之一,但是在黑客的手中,它是危险的软件之一。它是最古老的网络威胁之一。他们用它来窃取受害者的信息,他们收集的信息可能是机密或个人信息,也可能是与银行相关的信息等等。
远程访问木马和KeyLogger之间的区别:
KeyLogger |
Remote Access Trojans |
It is used to record the keystrokes entered by the user. | It enables the attacker to gain control over the device or gaining remote access. |
It can make itself undetected, and it is possible in the case of a hardware keylogger. | It can make itself undetected, and they remain in the device for a longer period of time. |
Software keylogger provides the advantage of taking snapshots and recording videos. | It can also be used to activate the webcam, and we can record video. |
It does not do any damage to the system. | It does damage the system. |
User will not experience any slow internet experience. | User may experience the internet being slow. |
With a keylogger one can’t gain total control of the infected system. | It gives the hacker total control of the infected system. |