Keystroke Logging - Cracking

Cracking

Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

Read more about this topic:  Keystroke Logging

Famous quotes containing the word cracking:

    Hume’s doctrine was that the circumstances vary, the amount of happiness does not; that the beggar cracking fleas in the sunshine under a hedge, and the duke rolling by in his chariot; the girl equipped for her first ball, and the orator returning triumphant from the debate, had different means, but the same quantity of pleasant excitement.
    Ralph Waldo Emerson (1803–1882)

    Thou wilt quarrel with a man for cracking nuts, having no other reason but because thou hast hazel eyes.
    William Shakespeare (1564–1616)

    All round and round does the world lie as in a sharp-shooter’s ambush, to pick off the beautiful illusions of youth, by the pitiless cracking rifles of the realities of age.
    Herman Melville (1819–1891)