Keystroke Logging - Cracking

Cracking

Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.

Read more about this topic:  Keystroke Logging

Famous quotes containing the word cracking:

    All round and round does the world lie as in a sharp-shooter’s ambush, to pick off the beautiful illusions of youth, by the pitiless cracking rifles of the realities of age.
    Herman Melville (1819–1891)

    All true histories contain instruction; though, in some, the treasure may be hard to find, and when found, so trivial in quantity that the dry, shrivelled kernel scarcely compensates for the trouble of cracking the nut.
    Anne Brontë (1820–1849)

    I also heard the whooping of the ice in the pond, my great bed-fellow in that part of Concord, as if it were restless in its bed and would fain turn over, were troubled with flatulency and bad dreams; or I was waked by the cracking of the ground by the frost, as if some one had driven a team against my door, and in the morning would find a crack in the earth a quarter of a mile long and a third of an inch wide.
    Henry David Thoreau (1817–1862)