Keystroke Logging
-
Keystroke logging, often abbreviated keylogging, refers to the monitoring or logging of the keys struck by another user. This action often is done covertly to ensure the user is unaware of the keylogging activity. Hacker methods include remote-access software keylogging and virus keylogging.
Remote-Access Software
-
Hackers can use malware that a user downloads via a computer network to track keystrokes. Malware, or malicious software, are software programs that often are used to record user activity without his knowledge. Hackers can add features to malware that enable recorded keystrokes from another user's computer to be transmitted to a computer at a remote location.
Virus Keylogging
-
Hackers also can log user keystrokes via a computer virus, or a type of computer program that infects computers by copying itself. Hackers can add code to an existing virus or create a new virus with the intent of tracking user keystrokes. A computer virus, such as a trojan horse, sends keylogging information to the hacker's Internet Protocol (IP) address or email address.
No comments:
Post a Comment