| 
  • If you are citizen of an European Union member nation, you may not use this service unless you are at least 16 years old.

  • You already know Dokkio is an AI-powered assistant to organize & manage your digital files & messages. Very soon, Dokkio will support Outlook as well as One Drive. Check it out today!

View
 

KeyLoggers

Page history last edited by Dmitry Sokolov 5 years, 1 month ago

Go:

 Visual Taxonomy Links   Hide/Show:

Taxonomy Path

SSS Yet To Be Done.

https://en.wikipedia.org/wiki/Keystroke_logging

This article is part of a series on
Information security
Related security categories
Threats
Defenses

A keylogger example of a screencapture, which holds potentially confidential and private information. The image below holds the corresponding keylogger text result.

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keylogger can be either software or hardware.

While the programs themselves are legal,[1] with many of them being designed to allow employers to oversee the use of their computers, keyloggers are most often used for the purpose of stealing passwords and other confidential information.[2][3]

Keylogging can also be used to study human–computer interaction. Numerous keylogging methods exist: they range from hardware and software-based approaches to acoustic analysis.


Links  

See also


 

Subcategories

``

Pages

`A

Any Keylogger

`S

Spyrix Free Keylogger

Pages in Other Languages

 

Forking

 

Categories:

Cryptographic attacks

Spyware

Cybercrime

Security breaches

 

Comments (0)

You don't have permission to comment on this page.