SlideShare a Scribd company logo
International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 11, Issue 09 (September 2015), PP.32-36
32
Spyware triggering system by particular string value
Divij H.Patel
B.tech, computer engineering, Ipcowala institute of engineering & technology, dharmaj, Gujarat, India
Abstract:-This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
Keywords: - triggered, spyware, particular keyword, real time, hidden mode.
I. INTRODUCTION
Nowadays computer software is in a vogue. Moreover, there are lot of computer software and systems
available in the market. Among all of them they have inadequacy or not even one we can see has not any
imperfection and because of this inadequacy hackers are able to hack the system or they can try to take all data
secretly. Now we are going to discuss about some basic hacking software and techniques.
Keylogger and spyware are two common software that used in hacking. Keyloggers are software which
can keep watch on all the typing related activities of user and save them. Hackers use this software to know
what user is typing.
Spyware is different type of virus. We can use them to take various data from the computer. Spywares
work on background. It is capable of doing detective work like,
A. Send all the information of user to other person or system (without knowing them).
B. Frequently send victim‟s snapshots to users.
C. Secretly record the conversation between two people through microphone and send it to other system.
D. Secretly keep eye on the person through webcam.
So, above all we discuss about two most common hacking techniques. Now new hacking techniques are as
follows.
This is one type of spyware triggering software. Which has a unique feature is that when we load or
start the software in the system and it takes the string value as an input and after that this software starts working.
This software has an ability to provide real time working. However, this software secretly checks user‟s typing
activity and if it finds anything match than automatically trigger spyware programme.
Usually, It is work on background due to that victim does not know about that work. Computer user
normally type a lot when they work. This software checks everything and software start working if anything
matches from the system.
Example: - At starting of software if hacker or a user store „ABC‟ as an input string or as particular keyword.
Then after when user type „ABC‟ by knowingly or unknowingly during work and automatically spyware
programme start for private investigation.
These types of software and programme have some good and bad usage. Which we will be discussing,
furthermore in the following section. Moreover, we will discuss working process in detail through flow chart.
II. FLOW CHART
Now from the below flow chart we will discussing about the step by step working process of spyware
triggering system and briefly understand about the necessary part of this working model like a different types of
working process of triggering spyware programmes.
Spyware triggering system by particular string value
33
Fig.1: Flow chart of triggering spyware system
In the flow chart first process is starting process which define starting stage when software is launch or
when user start software by double click at the next step there will input box comes up to the screen and ask for
the input string or particular keyword, then after entering input after it will check the length of input, condition
will be true if the length is more than one character then it will goes to next step otherwise condition will be
false and it again ask for the input. After this process input will store in main memory. Then after automatically
Spyware triggering system by particular string value
34
software goes to hidden mode for the privacy of its working process. At the next step infinite loop start for the
continuity of working process, and then it will start capturing all the keystroke that typed by user knowingly or
unknowingly, and compare with main string or keyword that store in memory. If any input match with that then
it will automatically triggered or launch spyware programmes.
The main purpose of triggering or launching spyware programmes is to find out why user entered this
type of keyword in their computer. There are many types of work done by the spyware programmes like:-
A. Mail sending spyware
The main purpose of this type of spyware is to send data that was saved by another spyware programme.
B. Snapshot capture and store.
This type of programme secretly capture snapshot of working window and store it on define path.
C. Secretly voice recording.
After launching it will start recording voice input by using microphone and then store it in the form of audio file.
D. Webcam video recording
Start capturing photos and videos of user activities and store it to the define path in the form of image or video
file.
We have seen on above fig-1 whole working process of software. Most important aspect is that how we
triggered spyware software through string value. Once we start software then after it is capable to perform
various types of jobs which we discussed above.
Fig .2: flow chart of spyware working process
Now we will explore about another most important facet about this software. In the first part we talk
about different work capabilities of spyware after launching. Now we further discuss how it is possible to do all
the tasks simultaneously.
Spyware triggering system by particular string value
35
As shown on fig-2 once when keystroke match with the stored string then spyware programme will
activate and start working on different tasks as per shown on flow chart it will secretly capture snapshot and
save it in a drive. Meanwhile another programme record user‟s voice and save the audio clip in to the same drive,
and same time access webcam and secretly click on video and images and save them all. Furthermore keylogger
spyware will store user‟s typing activity in to the drive.
After successfully store all this spying data it will send it to mailing interface or fetch in a network
programme, now from here it will go to out side‟s system or email.
III. USES AND APPLICATION
This type of software we can use not only for one purpose but also many ways. The main purpose of
using this software is that which keyword is type by the person when he/she works on the computer and which
is set by the software hacker as a keyword than this software helps to know, what is the purpose of using
same(that) word by the user. This is the one type of spying software.
Mainly hackers and programmers can use this type of software for hacking purpose or any other spying
related study purpose. This software is used by hackers to know which type of keyword victim or users type and
what is the purpose of using that keyword. In this situation they can set such a keyword in software according to
information they wants to know. Because of this set keyword by the hackers whenever victim use such a
keyword than automatically spyware system will activated and start sending their computer's typing related
activity to hackers.
In most cases people want to keep secret their computer related team work information. In this situation
people can use this system to protect against third party involvement. If anyone wants to try send such an
important information to outsider this spyware software straight away infirm the user or owner of the computer.
This software can be used in many ways like Home, Office, Colleges and many more. In other words we can say
that, today parents do not want their children miss use technology or useless typing activity. This software can
be used to protect children against useless activity. Parents can set such a keyword and load it. By using this
software they can keep a strict watch on all typing activities of their children on computer.
Another most important use of this software is in any office or company this software can be load than
if any employee tries to searching or typing on any other topic rather than office work then automatically
spyware programmed infirm manager or authorized person.
This software has some drawbacks as well. Instead of spyware system if any other programmed can be
load by the hacker then that can be harmful to computer system. Hackers and cheaters can use this system easily
without your permission and they can get all your secret information related to your typing activities. This
software can be dangerous for the people who do not really know about it or they do not have enough
knowledge about information technology.
IV. CONCLUSION
As per above discussion, it can be seen that the usage of this software can be good or bad but
drawbacks of this software out weighted the benefits. Normally people know about spyware and keylogger
software but in this tropic we step ahead and talk about hacking system and techniques. We try to cover here
good and bad aspect of hacking. Generally people who do not have knowledge they scared from it. In this topic,
we try to help people to accept the concept of hacking and provide them brief idea of hacking system then they
can protect themselves from being victim.
V. FUTURE SCOPE
Above all we discussed about step by step working process through flow chart in brief. Now this
software works only on operating system. In short we can say that the usage of this system is limited to
computers. In near future we can update a new system which will work on servers that means when user surfing
web site and meanwhile he/she type any unauthorized keyword then automatically quit the website from there.
Spyware triggering system by particular string value
36
REFERENCES
[1]. Hemita Pathak1
,Apurva Pawar2
,Balaji Patil3
,"A Survey on Keylogger: A malicious Attack,”
International Journal of Advanced Research in Computer Engineering & Technology (IJARCET)
Volume 4 Issue 4, April 2015.
[2]. Nairit Adhikary1
, Rohit Shrivastava2
, Ashwani Kumar3
, Sunil Kumar Verma4
, Monark Bag5
, Vrijendra
Singh6
, “Battering Keyloggers and Screen Recording Software by Fabricating Passwords,” I. J.
Computer Network and Information Security, 2012, 5, 13-21
[3]. Mehdi Dadkhah1
, Mohammad Davarpanah Jazi2
,” Secure Payment in E-commerce: Deal with
Keyloggers and Pishings,” International Journal of Electronics Communication and Computer
EngineeringVolume 5, Issue 3, ISSN (Online): 2249–071X, ISSN (Print): 2278–4209.
[4]. Milind. J. Joshi1
, Bhaskar V. Patil2
,” Computer Virus: Their Problems & Major attacks in Real Life,”
Journal of Advanced Computer Science and Technology, 1 (4) (2012) 316-324.
[5]. Mark B. Schmidt, Kirk P. Arnett ,” Spyware: a little knowledge is a wonderful thing,”
Communications of the ACM, Vol. 48 No. 8, Pages 67-70.

More Related Content

What's hot (8)

PDF
Application of data mining based malicious code detection techniques for dete...
UltraUploader
 
PDF
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET Journal
 
PDF
Mobile security-user-guide-en
#CreativeResourcesBD
 
PPTX
Soham web security
Soham Sengupta
 
PPTX
Spyware and key loggers
Ganeshdev Chavhan
 
PDF
How to-remove- virus
securesolutionusa
 
Application of data mining based malicious code detection techniques for dete...
UltraUploader
 
IRJET- Web Application Firewall: Artificial Intelligence ARC
IRJET Journal
 
Mobile security-user-guide-en
#CreativeResourcesBD
 
Soham web security
Soham Sengupta
 
Spyware and key loggers
Ganeshdev Chavhan
 
How to-remove- virus
securesolutionusa
 

Similar to Spyware triggering system by particular string value (20)

PDF
Detection and prevention of keylogger spyware attacks
IAEME Publication
 
PPT
Security Software
bennybigbang
 
PPT
Keyloggers and Spywares
Ankit Mistry
 
PPT
Computer
faisalbhatti
 
DOCX
Cambridge IGCSE ICT Revision Notes
Yash Bhatt
 
DOCX
Create a software key logger
GiralFaurel
 
PPTX
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
PPTX
password cracking and Key logger
Patel Mit
 
PPTX
Keyloger & spyware
KashifKhan417
 
PDF
Nota Padat ICT SPM
D.J Md Thani
 
PPT
E 100_p
Jahairam76
 
PPT
Computer
sk_just2121
 
PPT
Complete notes security
Kitkat Emoo
 
PDF
The process of computer security
WritingHubUK
 
DOCX
Chapter 10.0
Adebisi Tolulope
 
PPT
Your personal computer[1]
mjandrewsteachonline
 
PDF
Spyware manual
Rumman Ansari
 
PPTX
Internetsecuritypowerpoint 130404101055-phpapp02
sanjay kumar
 
PPTX
Parag presentation on ethical hacking
parag101
 
Detection and prevention of keylogger spyware attacks
IAEME Publication
 
Security Software
bennybigbang
 
Keyloggers and Spywares
Ankit Mistry
 
Computer
faisalbhatti
 
Cambridge IGCSE ICT Revision Notes
Yash Bhatt
 
Create a software key logger
GiralFaurel
 
Societal Impacts Of IT (Class X)
Vatsal Unadkat
 
password cracking and Key logger
Patel Mit
 
Keyloger & spyware
KashifKhan417
 
Nota Padat ICT SPM
D.J Md Thani
 
E 100_p
Jahairam76
 
Computer
sk_just2121
 
Complete notes security
Kitkat Emoo
 
The process of computer security
WritingHubUK
 
Chapter 10.0
Adebisi Tolulope
 
Your personal computer[1]
mjandrewsteachonline
 
Spyware manual
Rumman Ansari
 
Internetsecuritypowerpoint 130404101055-phpapp02
sanjay kumar
 
Parag presentation on ethical hacking
parag101
 
Ad

More from IJERD Editor (20)

PDF
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
PDF
MEMS MICROPHONE INTERFACE
IJERD Editor
 
PDF
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
PDF
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
PDF
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
PDF
Router 1X3 – RTL Design and Verification
IJERD Editor
 
PDF
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
PDF
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
PDF
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
PDF
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
PDF
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
PDF
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
PDF
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
PDF
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
PDF
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
PDF
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
PDF
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
PDF
Importance of Measurements in Smart Grid
IJERD Editor
 
PDF
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 
PDF
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
IJERD Editor
 
A Novel Method for Prevention of Bandwidth Distributed Denial of Service Attacks
IJERD Editor
 
MEMS MICROPHONE INTERFACE
IJERD Editor
 
Influence of tensile behaviour of slab on the structural Behaviour of shear c...
IJERD Editor
 
Gold prospecting using Remote Sensing ‘A case study of Sudan’
IJERD Editor
 
Reducing Corrosion Rate by Welding Design
IJERD Editor
 
Router 1X3 – RTL Design and Verification
IJERD Editor
 
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...
IJERD Editor
 
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVR
IJERD Editor
 
Study on the Fused Deposition Modelling In Additive Manufacturing
IJERD Editor
 
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...
IJERD Editor
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
IJERD Editor
 
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...
IJERD Editor
 
Gesture Gaming on the World Wide Web Using an Ordinary Web Camera
IJERD Editor
 
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...
IJERD Editor
 
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...
IJERD Editor
 
Moon-bounce: A Boon for VHF Dxing
IJERD Editor
 
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...
IJERD Editor
 
Importance of Measurements in Smart Grid
IJERD Editor
 
Study of Macro level Properties of SCC using GGBS and Lime stone powder
IJERD Editor
 
Seismic Drift Consideration in soft storied RCC buildings: A Critical Review
IJERD Editor
 
Ad

Recently uploaded (20)

PDF
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
AWS Chicago
 
DOCX
TLE9 COOKERY DLL WEEK3 technology and li
jamierha cabaero
 
PPTX
Extensions Framework (XaaS) - Enabling Orchestrate Anything
ShapeBlue
 
PDF
Upgrading to z_OS V2R4 Part 01 of 02.pdf
Flavio787771
 
PPT
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
PDF
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PDF
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
PDF
CIFDAQ'S Token Spotlight for 16th July 2025 - ALGORAND
CIFDAQ
 
PDF
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
PDF
Productivity Management Software | Workstatus
Lovely Baghel
 
PDF
HR agent at Mediq: Lessons learned on Agent Builder & Maestro by Tacstone Tec...
UiPathCommunity
 
PPTX
UI5Con 2025 - Beyond UI5 Controls with the Rise of Web Components
Wouter Lemaire
 
PPTX
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PPTX
UI5Con 2025 - Get to Know Your UI5 Tooling
Wouter Lemaire
 
PDF
Novus-Safe Pro: Brochure-What is Novus Safe Pro?.pdf
Novus Hi-Tech
 
PPTX
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
PPTX
python advanced data structure dictionary with examples python advanced data ...
sprasanna11
 
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
AWS Chicago
 
TLE9 COOKERY DLL WEEK3 technology and li
jamierha cabaero
 
Extensions Framework (XaaS) - Enabling Orchestrate Anything
ShapeBlue
 
Upgrading to z_OS V2R4 Part 01 of 02.pdf
Flavio787771
 
Interview paper part 3, It is based on Interview Prep
SoumyadeepGhosh39
 
Top Managed Service Providers in Los Angeles
Captain IT
 
Meetup Kickoff & Welcome - Rohit Yadav, CSIUG Chairman
ShapeBlue
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Ampere Offers Energy-Efficient Future For AI And Cloud
ShapeBlue
 
CIFDAQ'S Token Spotlight for 16th July 2025 - ALGORAND
CIFDAQ
 
Women in Automation Presents: Reinventing Yourself — Bold Career Pivots That ...
DianaGray10
 
Productivity Management Software | Workstatus
Lovely Baghel
 
HR agent at Mediq: Lessons learned on Agent Builder & Maestro by Tacstone Tec...
UiPathCommunity
 
UI5Con 2025 - Beyond UI5 Controls with the Rise of Web Components
Wouter Lemaire
 
The Yotta x CloudStack Advantage: Scalable, India-First Cloud
ShapeBlue
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
UI5Con 2025 - Get to Know Your UI5 Tooling
Wouter Lemaire
 
Novus-Safe Pro: Brochure-What is Novus Safe Pro?.pdf
Novus Hi-Tech
 
✨Unleashing Collaboration: Salesforce Channels & Community Power in Patna!✨
SanjeetMishra29
 
python advanced data structure dictionary with examples python advanced data ...
sprasanna11
 

Spyware triggering system by particular string value

  • 1. International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 11, Issue 09 (September 2015), PP.32-36 32 Spyware triggering system by particular string value Divij H.Patel B.tech, computer engineering, Ipcowala institute of engineering & technology, dharmaj, Gujarat, India Abstract:-This computer programme can be used for good and bad purpose in hacking or in any general purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if user or hacker store particular string as a input after that software continually compare typing activity of user with that stored string and if it is match then launch spyware programme. Keywords: - triggered, spyware, particular keyword, real time, hidden mode. I. INTRODUCTION Nowadays computer software is in a vogue. Moreover, there are lot of computer software and systems available in the market. Among all of them they have inadequacy or not even one we can see has not any imperfection and because of this inadequacy hackers are able to hack the system or they can try to take all data secretly. Now we are going to discuss about some basic hacking software and techniques. Keylogger and spyware are two common software that used in hacking. Keyloggers are software which can keep watch on all the typing related activities of user and save them. Hackers use this software to know what user is typing. Spyware is different type of virus. We can use them to take various data from the computer. Spywares work on background. It is capable of doing detective work like, A. Send all the information of user to other person or system (without knowing them). B. Frequently send victim‟s snapshots to users. C. Secretly record the conversation between two people through microphone and send it to other system. D. Secretly keep eye on the person through webcam. So, above all we discuss about two most common hacking techniques. Now new hacking techniques are as follows. This is one type of spyware triggering software. Which has a unique feature is that when we load or start the software in the system and it takes the string value as an input and after that this software starts working. This software has an ability to provide real time working. However, this software secretly checks user‟s typing activity and if it finds anything match than automatically trigger spyware programme. Usually, It is work on background due to that victim does not know about that work. Computer user normally type a lot when they work. This software checks everything and software start working if anything matches from the system. Example: - At starting of software if hacker or a user store „ABC‟ as an input string or as particular keyword. Then after when user type „ABC‟ by knowingly or unknowingly during work and automatically spyware programme start for private investigation. These types of software and programme have some good and bad usage. Which we will be discussing, furthermore in the following section. Moreover, we will discuss working process in detail through flow chart. II. FLOW CHART Now from the below flow chart we will discussing about the step by step working process of spyware triggering system and briefly understand about the necessary part of this working model like a different types of working process of triggering spyware programmes.
  • 2. Spyware triggering system by particular string value 33 Fig.1: Flow chart of triggering spyware system In the flow chart first process is starting process which define starting stage when software is launch or when user start software by double click at the next step there will input box comes up to the screen and ask for the input string or particular keyword, then after entering input after it will check the length of input, condition will be true if the length is more than one character then it will goes to next step otherwise condition will be false and it again ask for the input. After this process input will store in main memory. Then after automatically
  • 3. Spyware triggering system by particular string value 34 software goes to hidden mode for the privacy of its working process. At the next step infinite loop start for the continuity of working process, and then it will start capturing all the keystroke that typed by user knowingly or unknowingly, and compare with main string or keyword that store in memory. If any input match with that then it will automatically triggered or launch spyware programmes. The main purpose of triggering or launching spyware programmes is to find out why user entered this type of keyword in their computer. There are many types of work done by the spyware programmes like:- A. Mail sending spyware The main purpose of this type of spyware is to send data that was saved by another spyware programme. B. Snapshot capture and store. This type of programme secretly capture snapshot of working window and store it on define path. C. Secretly voice recording. After launching it will start recording voice input by using microphone and then store it in the form of audio file. D. Webcam video recording Start capturing photos and videos of user activities and store it to the define path in the form of image or video file. We have seen on above fig-1 whole working process of software. Most important aspect is that how we triggered spyware software through string value. Once we start software then after it is capable to perform various types of jobs which we discussed above. Fig .2: flow chart of spyware working process Now we will explore about another most important facet about this software. In the first part we talk about different work capabilities of spyware after launching. Now we further discuss how it is possible to do all the tasks simultaneously.
  • 4. Spyware triggering system by particular string value 35 As shown on fig-2 once when keystroke match with the stored string then spyware programme will activate and start working on different tasks as per shown on flow chart it will secretly capture snapshot and save it in a drive. Meanwhile another programme record user‟s voice and save the audio clip in to the same drive, and same time access webcam and secretly click on video and images and save them all. Furthermore keylogger spyware will store user‟s typing activity in to the drive. After successfully store all this spying data it will send it to mailing interface or fetch in a network programme, now from here it will go to out side‟s system or email. III. USES AND APPLICATION This type of software we can use not only for one purpose but also many ways. The main purpose of using this software is that which keyword is type by the person when he/she works on the computer and which is set by the software hacker as a keyword than this software helps to know, what is the purpose of using same(that) word by the user. This is the one type of spying software. Mainly hackers and programmers can use this type of software for hacking purpose or any other spying related study purpose. This software is used by hackers to know which type of keyword victim or users type and what is the purpose of using that keyword. In this situation they can set such a keyword in software according to information they wants to know. Because of this set keyword by the hackers whenever victim use such a keyword than automatically spyware system will activated and start sending their computer's typing related activity to hackers. In most cases people want to keep secret their computer related team work information. In this situation people can use this system to protect against third party involvement. If anyone wants to try send such an important information to outsider this spyware software straight away infirm the user or owner of the computer. This software can be used in many ways like Home, Office, Colleges and many more. In other words we can say that, today parents do not want their children miss use technology or useless typing activity. This software can be used to protect children against useless activity. Parents can set such a keyword and load it. By using this software they can keep a strict watch on all typing activities of their children on computer. Another most important use of this software is in any office or company this software can be load than if any employee tries to searching or typing on any other topic rather than office work then automatically spyware programmed infirm manager or authorized person. This software has some drawbacks as well. Instead of spyware system if any other programmed can be load by the hacker then that can be harmful to computer system. Hackers and cheaters can use this system easily without your permission and they can get all your secret information related to your typing activities. This software can be dangerous for the people who do not really know about it or they do not have enough knowledge about information technology. IV. CONCLUSION As per above discussion, it can be seen that the usage of this software can be good or bad but drawbacks of this software out weighted the benefits. Normally people know about spyware and keylogger software but in this tropic we step ahead and talk about hacking system and techniques. We try to cover here good and bad aspect of hacking. Generally people who do not have knowledge they scared from it. In this topic, we try to help people to accept the concept of hacking and provide them brief idea of hacking system then they can protect themselves from being victim. V. FUTURE SCOPE Above all we discussed about step by step working process through flow chart in brief. Now this software works only on operating system. In short we can say that the usage of this system is limited to computers. In near future we can update a new system which will work on servers that means when user surfing web site and meanwhile he/she type any unauthorized keyword then automatically quit the website from there.
  • 5. Spyware triggering system by particular string value 36 REFERENCES [1]. Hemita Pathak1 ,Apurva Pawar2 ,Balaji Patil3 ,"A Survey on Keylogger: A malicious Attack,” International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Volume 4 Issue 4, April 2015. [2]. Nairit Adhikary1 , Rohit Shrivastava2 , Ashwani Kumar3 , Sunil Kumar Verma4 , Monark Bag5 , Vrijendra Singh6 , “Battering Keyloggers and Screen Recording Software by Fabricating Passwords,” I. J. Computer Network and Information Security, 2012, 5, 13-21 [3]. Mehdi Dadkhah1 , Mohammad Davarpanah Jazi2 ,” Secure Payment in E-commerce: Deal with Keyloggers and Pishings,” International Journal of Electronics Communication and Computer EngineeringVolume 5, Issue 3, ISSN (Online): 2249–071X, ISSN (Print): 2278–4209. [4]. Milind. J. Joshi1 , Bhaskar V. Patil2 ,” Computer Virus: Their Problems & Major attacks in Real Life,” Journal of Advanced Computer Science and Technology, 1 (4) (2012) 316-324. [5]. Mark B. Schmidt, Kirk P. Arnett ,” Spyware: a little knowledge is a wonderful thing,” Communications of the ACM, Vol. 48 No. 8, Pages 67-70.