Trojan

(redirected from Keystroke logger)
Also found in: Dictionary, Medical, Encyclopedia.
Graphic Thesaurus  🔍
Display ON
Animation ON
Legend
Synonym
Antonym
Related
  • noun

Synonyms for Trojan

a native of ancient Troy

a program that appears desirable but actually contains something harmful

Synonyms

Related Words

References in periodicals archive ?
Particular emphasis is placed on keystroke logging, and as such, the paper also reviews several considerations that researchers must address when trying to use keystroke loggers to collect process data from participants via the Internet.
All the while the keystroke logger is capturing the patient's personal and confidential information, which will be delivered outside of the healthcare center to the Internet later that morning.
Scarfo, the FBI placed a keystroke logger on a computer to help crack a password-protected file, and the government successfully argued that only data sent through the modem and across the Internet was considered an electronic communication, and that something that was simply being typed--for example, a word-processing document not being transmitted across the Internet--was not.
Its WebWatcher solution is the leading computer monitoring software and its keystroke logger outperforms all other keylogger monitoring software programs on the market.
Seventy bucks at the same site will buy you a keystroke logger with an 8,000-stroke memory, while for a mere $25 you can get a product that claims to be able make it "impossible for a video or still camera to take a legible photograph of your license plate number.
Its WebWatcher solution is the leading computer monitoring software for parents, and its keystroke logger outperforms all other keylogger monitoring software programs on the market.
This solution must prevent phishing, man-in-the-middle, keystroke logger and other internet attacks while providing a simple authentication experience for their customers, employees, and partners.
New forms of surveillance such as those involving mobile devices, keystroke loggers, GPS vehicle trackers, and social networks as well as traditional approaches like trash runs are covered here as well.
In a warning issued earlier this week,it said the latest trend by cybercriminals is to get employee login credentials, using spam and phishing emails, keystroke loggers, and Remote Access Trojans (RAT).
The authentication call is out-of-band, offering protection from man-in-the-middle attacks and keystroke loggers.
As with downloading e mail attachments from unknown senders, this can be dangerous, giving cybercriminals an chance to secrete malicious programmes such as keystroke loggers and password and information phishing recorders.
Flash Padlock is impervious to "brute force" hacks or keystroke loggers that would defeat a software secured USB flash drive.