Cracking
Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a trojan horse or as part of a virus. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.
Read more about this topic: Keystroke Logging
Famous quotes containing the word cracking:
“A world is in flames, and you are cracking silly jokes.”
—Friedrich Dürrenmatt (19211990)
“Thou wilt quarrel with a man for cracking nuts, having no other reason but because thou hast hazel eyes.”
—William Shakespeare (15641616)
“All true histories contain instruction; though, in some, the treasure may be hard to find, and when found, so trivial in quantity that the dry, shrivelled kernel scarcely compensates for the trouble of cracking the nut.”
—Anne Brontë (18201849)