Introducing Keyboard Encryption


Welcome to Spacecycles
Did you know...
       - 38% of corporate data resides exclusively on mobile devices: tablets, smartphones, laptops
       - Keylogging is a form of Malware and is undetectable
       - 98% of all malware breaches involve some form of keylogging
       - Over 70 million mobile devices are stolen or lost every year, that number is rising
       - ONE laptop is stolen every 53 seconds 43% off-site, 33% in transit, 24% in the workplace
       - 66% of employees use unsanctioned file sharing
       - 93% of organizations fail to backup tablets and smartphones
       - Over 50% of lost devices result in a data breach involving malware
       - Estimated total cost of the loss of ONE laptop = $49,250

Explaining Keylogging and How to Protect Yourself

This an introduction of keylogging and how to protect yourself from it.

Keyloggers: Three Types

NIST scientists identified three main types of keyloggers:


  1. Hardware -- Tiny inline devices placed between the keyboard and the computer. Because of their size, they can go undetected for long periods of time. These devices have the power to capture hundreds of keystrokes, including banking and email username and passwords. But for the criminal, the threat of being caught breaching the machine is a deterrent.

  2. Software -- This type of keylogging is done by using the Windows function SetWindowsHookEx that monitors all keystrokes. The spyware will usually appear packaged as an executable file that initiates the hook function, plus a DLL file to handle the logging functions. An application that calls SetWindowsHookEx is capable of capturing even autocomplete passwords.

  3. Kernel/driver -- This kind of keylogger is at the kernel level and receives data directly from the input device (typically a keyboard). It replaces the core software for interpreting keystrokes. This type of keylogger can be programmed to be virtually undetectable by being executed when the computer is turned on, before any user-level applications start. Since the program runs at the kernel level, one disadvantage to this approach it that it fails to capture autocomplete passwords, as this information is passed in the application layer.

"Keyloggers aren’t going away anytime soon; they’re practically as common as dirt in the world of spying and crime." PCWorld July 2017

Mobile Solutions

Cloud Computing

Data Recovery

We provide mobile software products that will secure your data by backing it up so you can restore the data when you need it. You can sync your data across all of your mobile devices and share data with friends, family and co-workers. If your device is lost or stolen we can track the location of your device and wipe clean the data on the device. We provide mobile encryption solutions to protect your identity and block keyloggers from capturing your keystrokes. We can also encrypt the keystrokes on your PC or Mac to keep you anonymous in the cloud.


We provide cloud storage and hosting platforms that enable you to extend your computing resources to the cloud. Whether you need Virtual Servers, Hosted Virtual Destops or Co-location services we can deliver the quality you need at a price you can afford. We also provide conversion service that can assist you with upgrading your Operating Systems and/or Software.


We have been recovering data from failed storage devices for over 35 years. We own our own dust free clean room where we can recover data from smartphones, flash drives, hard drives, solid state drives and RAID systems. We provide a free evaluation, if we cannot recover the data there is no charge. We can also rescue your systems from ransomware and other intrusion events that can severely damage your business. Learn More!