http://go.microsoft.com/?linkid=6951838
This white paper from the Microsoft Antimalware Team explores the technical methods used by both hardware- and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and the social and legal appropriateness of various use scenarios.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment