Block the action of keylogger malware or applications and protect your private information, such as usernames, passwords from leaking out
B’Antilogger is a simple to use application that allows you to protect your system and your private information from processes that record keystrokes. It is designed to block the effect of keylogging malware, but also applications, therefore preventing passwords or account numbers from leaking out.
Protect your system from information leaks
Keylogger applications can be used as security tools, in order to monitor the activity of other users on your computer, especially online conversations. However, keylogger processes that run on your computer due to virus or malware infection can send the logs to unknown destinations. They can record keystrokes without your knowledge or permission.
B’Antilogger can help you protect your system from such threats, by blocking the effect of such processes. The program runs in the background, but you can prompt its interface in order to activate or deactivate the real-time protection. The application is designed to notify you with a message whenever a specific process attempts to record keystrokes.
Whitelists, or supported programs
B’Antilogger allows you to customize the way it is functioning, such as enable or disable the protection module, as well as activate or deactivate the autorun at Windows startup. You may also choose to display the splash screen at program start and the protection interval. The protection interval measuring unit is not specified.
The program allows you to create a whitelist to which you may add various processes, as exceptions from the keylogging blocking. They may be programs that you trust or applications that require advanced permissions, which are not submitted to the verification process.
Blocking keylogging applications
B’Antilogger is designed to prevent any process from recording keystrokes, regardless if they are unwanted threats or programs you installed yourself. However, most of the times, the application conflicts with keylogging programs that you install. It is not capable of blocking their action and sometimes it is even detected by the logging software as interfering with their effects.