Cracking
Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.
Read more about this topic: Keystroke Logging
Famous quotes containing the word cracking:
“Humes doctrine was that the circumstances vary, the amount of happiness does not; that the beggar cracking fleas in the sunshine under a hedge, and the duke rolling by in his chariot; the girl equipped for her first ball, and the orator returning triumphant from the debate, had different means, but the same quantity of pleasant excitement.”
—Ralph Waldo Emerson (18031882)
“All true histories contain instruction; though, in some, the treasure may be hard to find, and when found, so trivial in quantity that the dry, shrivelled kernel scarcely compensates for the trouble of cracking the nut.”
—Anne Brontë (18201849)
“A world is in flames, and you are cracking silly jokes.”
—Friedrich Dürrenmatt (19211990)