54 Theory, Implementation and Protection of Keylogger—Analysis the Method of Keylogger Using a Live Example
Download citation file:
- Ris (Zotero)
- Reference Manager
There exist many ways to log a user's keyboard input characters as a way to steal vital information, here we will describe two efficient and common ways of remote hook of Windows platform and virtual keyboard device and we will show how to implement the hook method. After all we will introduce several ways to protect windows PCs from such attack of keylogger.