Is "blank out encryption" also a keystroke encryption technique?
Recently I analyzed a keylogger written in VB that, after decompiling, I saw it implemented a stable and secure method using a Windows api. This api (SetWindowsHookEx) allowed to hook it to a hardware and listen to it and allows you to intercept before of Windows.
Just the first part of the code activates the hook keeping in memory the handle to be able to dump it at the end, in practice it hooks up to the keyboard and performs a callback to the keyboardcallback function.
This callback function is invoked whenever a key is pressed. Then it copies the value from the memory in a structure.
This structure contains the variable vkCode that contains the key that was pressed. Then processing that key, you're done ...
Many KLs using this process implemented in the code.
Zemana, although this method, if the KL captures keystrokes, all they are encrypted random characters and single "target" application will be able to understand what you're typing.
Although no method is 100% bullet-proof, I think this is one of best practices against KL.