A Robust Technique of Anti Key-Logging using Key-Logging Mechanism

System security and privacy always have to face new confronts. Continuous updates in the operating systems and anti-virus applications strive to amplify the system security level. In recent years 'key-loggers' have proved to be one of the prevalent intimidations to security and privacy. Key-logger is a surreptitious surveillance application, which is used to keep record of user's activities on the computer in various ways like keyboard logging, screen logging, mouse logging and voice logging, completely in imperceptible mode. Although key-loggers can also be used for prolific purposes but due to the tremendous increase in the Internet usage, the caustic use of key-loggers simply surmounts its advantages. Key-loggers have gained so much supremacy in their execution that they have become a serious intimidation to the privacy and security of a computer. The fact which makes the key-loggers more perilous is their undetectable nature against anti-virus and spy-where applications. This paper discusses some existing techniques of fortification against key-loggers and also exemplifies a new technique along with its proved advantages.