Skip to Main Content
ASME Press Select Proceedings

International Conference on Measurement and Control Engineering 2nd (ICMCE 2011)

Yi Xie
Yi Xie
Search for other works by this author on:
No. of Pages:
ASME Press
Publication date:

There exist many ways to log a user's keyboard input characters as a way to steal vital information, here we will describe two efficient and common ways of remote hook of Windows platform and virtual keyboard device and we will show how to implement the hook method. After all we will introduce several ways to protect windows PCs from such attack of keylogger.

Key Words
1 Introduction
2 Keyloggers Based on Hook
3 An Example Hook Program
4 Denfense of Keylogger
5 Another Keylogger — Virtual Keyboard Device
6 Conclusion of Keylogger
This content is only available via PDF.
Close Modal
This Feature Is Available To Subscribers Only

Sign In or Create an Account

Close Modal
Close Modal