I'm looking for a software program that can monitor all keyboard entries and mouse clicks throughout the course...
of a day. My manager then wants a summary report of the activity; he doesn't care what information is entered, but he wants the number of key hits on the keyboard, number of mouse clicks, as well as time statistics. What are the risks of using a keylogger for this purpose? Are there better alternatives?
It sounds like your manager is looking to carry out some sort of productivity or behavioral research. I say this because he seems more interested in time statistics than actual inputted content.
The definition of a keylogger is any device or program that captures and records information from an input device. Input devices include keyboards, mice, touch screens and voice commands. So, yes, a keylogger is what you need to use, but most keyloggers only capture keyboard input.
Recording mouse clicks, however, is fairly meaningless unless you know what the user is clicking on. The main legitimate purpose of keyloggers is to monitor user activity. If, for example, an organization suspects an employee of sending confidential information to a third party, they may want to record his or her actions. This type of keylogger can be either a software program or a hardware dongle that sits between the keyboard and the desktop. With keyloggers, the main aim is capture the data input. Therefore the time between inputs is not critical, and time statistics are not recorded. Even a hacker's keyloggers do not record time-related data.
If you can't find a keylogger that captures all the data that you need, you could very easily write your own simple program to do this. If you're not that familiar with coding such a program, you could start by looking at the code for Keymail. Keymail is a keylogger that emails keystrokes to a chosen email address, but this program could easily be adapted to capture and store the information that your boss needs. If you need to capture data from users running different operating systems, then a hardware keylogger is the way to go; these are usually OS independent and do not require any software to be installed. They also have the advantage of not being affected by hardware crashes or system formats.
Whatever route you choose, you should be aware of the personal privacy rules that need to be adhered to. Also, you need to ensure that the logged data does not fall into the wrong hands, captured keystrokes may well include network passwords and other sensitive data. This is why hackers use keyloggers so frequently. They install keyloggers on users' machines in order to gather useful information for further attacks.
Related Q&A from Michael Cobb
Expert Michael Cobb explains how an HTTP referer header affects user privacy and outlines changes that can be made to ensure sensitive data is not ...continue reading
Expert Michael Cobb explains the difference between the REESSE3+ and IDEA block ciphers and explores when each is applicable in an enterprise setting.continue reading
While cookies are critical to delivering personalized Web content, they are a privacy concern. Learn how adding Bloom filters to cookies can help ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.