Journal of Engineering Design and

Computational Science

Open Access Peer Reviewed International Journal

gallery/logof png1

ISSN : 2583-5165

A Peer Reviewed/Referred

Open Access Journal

Submit Article at: submitarticlejedcs@gmail.com

Importatnt Link:

SUBMIT RESEARCH ARTICLE AT

submitarticlejedcs@gmail.com


THE VERSATILITY OF KEYLOGGERS:Data Retrieval and Covert Tracking Techniques


Author(s)
Rajasekhar Pittala,Swathi Rebbavarapu,Jahnavi Parasaram,Rohit Bhukya
Abstract
Abstract—These days, data recovery is the most crucial component in many businesses. Thus, data recovery is crucial in many situations. The keylogger, also known as keyboard capture or keylogging, is one of the greatest solutions for these kinds of issues. The process of recording a keystroke on a keyboard such that the user is unaware that their actions are being watched is known as keyboard capture. Users can recover data when a working file is damaged for a variety of circumstances, such as power outages, by using the keylogger application. This is a surveillance program designed to monitor people who record keystrokes and extract data from log files. With the help of this program, we can remember lost emails or URLs. In this keylogger project, the user is unaware that, during the designated time frame, every keystroke they make on the keyboard is being recorded and emailed to the admin's email address.