I would like to ask a some questions about keyloggers!
We hear a lot about computer security these days. Does the process of hacking consist of the use of widely differing techniques, each leading to pretty much the same result?
In other words are keyloggers, for example, a specialised tool for gaining access to another computer?
I understand a keylogger becomes active only if the victim opens an email attachment. Given reasonable knowledge is it, any sense, difficult to send the keylogger or are they neatly "packaged" ready for use?
Of course, here, I'm only talking about software keyloggers!
Finally, and I feel I have never been given a definite answer here! Maybe a straightforward answer is simply not available?
How difficult is it to find, or isolate, a keylogger?
Should one expect a basic anti-virus program to do this or does identifying the keylogger depend on the sophistication of the device assuming differences, of this kind, do exist between them?
,