1.远程访问木马:
这种远程访问木马的流行度在 2000 年代有所增加。在此期间,人们对这种病毒如何在互联网上传播以及什么是防病毒软件没有足够的了解?有一些类型的远程访问特洛伊木马值得怀疑。危险的部分是它可以在没有任何知识的情况下使用。例如,sub 7 提供了一个易于攻击者窃取密码等的界面。
2.键盘记录器:
它是旨在记录用户完成的击键的软件。这是最基本的软件之一,看似无害,但在黑客手中,却是最危险的软件之一。它是最古老的网络威胁之一。他们用它来窃取受害者的信息,他们收集的信息可能是机密或个人信息,也可能是与银行相关的信息等等。
远程访问木马和 KeyLogger 的区别:
KeyLogger |
Remote Access Trojans |
It is used to record the keystrokes entered by the user. | It enables the attacker to gain control over the device or gaining remote access. |
It can make itself undetected, and it is possible in the case of a hardware keylogger. | It can make itself undetected, and they remain in the device for a longer period of time. |
Software keylogger provides the advantage of taking snapshots and recording videos. | It can also be used to activate the webcam, and we can record video. |
It does not do any damage to the system. | It does damage the system. |
User will not experience any slow internet experience. | User may experience the internet being slow. |
With a keylogger one can’t gain total control of the infected system. | It gives the hacker total control of the infected system. |