Skip to Main Content
ASME Press Select Proceedings

International Conference on Measurement and Control Engineering 2nd (ICMCE 2011)

By
Yi Xie
Yi Xie
Search for other works by this author on:
ISBN:
9780791859858
No. of Pages:
500
Publisher:
ASME Press
Publication date:
2011

There exist many ways to log a user's keyboard input characters as a way to steal vital information, here we will describe two efficient and common ways of remote hook of Windows platform and virtual keyboard device and we will show how to implement the hook method. After all we will introduce several ways to protect windows PCs from such attack of keylogger.

Abstract
Key Words
1 Introduction
2 Keyloggers Based on Hook
3 An Example Hook Program
4 Denfense of Keylogger
5 Another Keylogger — Virtual Keyboard Device
6 Conclusion of Keylogger
References
This content is only available via PDF.
Close Modal
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close Modal
Close Modal