a application that secretly installs on your computer and spies on user
a file implanted into your computer by you accepting a malicious file which contains a program enabling the person to view they keystrokes you make with your keyboard, making it easy to steal your account
a hacker tool that, once installed on a system, captures all keystrokes and stores them in a file
a hidden computer program that records the keystrokes you make, online and offline
a hidden program that records every keystroke you make, whether online or offline
a hidden software program that secretly records your keystrokes and sends them to a person, web site or e-mail address
a malicious program designed to track your every move through monitoring your keystrokes
an application that records all the keystrokes and stores them in a file, which can later be sent by email, or uploaded to a server
an easy-to-use tool to monitor every keystroke on your own computer
an item of spyware which is sent by a file to your computer
a piece of software, usually invisible to the Task Manager and other normal tracking methods, that keeps track of everything that you type whenever you use a machine
a program designed to monitor user activity
a program or device that when installed on a computer, records the keystrokes entered on that computer
a program or piece of hardware that records all keyboard keystrokes to an encrypted file which can then be read later
a program that can log every keystroke on your computer
a program that can see your password when you type it in
a program, that ha a virus on it, to see all the keys you press on the keyboard
a program that logs all keystrokes
a program that records computer activity around the clock
a program that records keystrokes the user types in on the keyboard
a program that runs in the background, recording all the keystrokes
a program which records in a file the characters typed in from the keyboard
a small program or script that, once installed on your PC, captures all the information that you key in via your keyboard
a software or hardware application designed to capture all keystrokes typed
a software program or hardware to capture all keystrokes typed
a software program or small piece of
a spyware that stealthily records all keystrokes you
a surveillance software, which monitors and stores a user's keystrokes (anything that the person types), saves them and sends them to a receiver
a type of program that records everything you type, and reports it back to someone else
a type of surveillance software (considered to be either software or spyware ) that has the capability to record every keystroke you make to a log file (usually encrypted )
a type of system monitor Gaobot
a type of system monitor that has the ability Saproxy
a.k.a. key logger, keystroke logger. Originally developed as a diagnostic tool, these types of programs have been manipulated into tools hackers can use to capture passwords and other personal information. When you press a key on your keyboard, that key's electronic signal is passed to your computer. Keyloggers create a record of all such signals from your keyboard. Some keyloggers can also take screen shots of your computer screen at preset times. Some keyloggers can compress the resultant record and break it down into small, encrypted data packets and transmit them in bits and pieces over a period of time while you are connected to the internet. Such transmissions can be so small and happen so quickly that you do not notice any decrease in computer performance.
Program that logs keystrokes that you enter on your computer and sends them to a third party.
Tracking Software that records keyboard and/or mouse activity. Keyloggers typically either store the recorded keystrokes for later retrieval or they transmit them to the remote process or person employing the keylogger. While there are some legitimate uses of keyloggers, but they are often used maliciously by attackers to surreptitiously track behavior to perform unwanted or unauthorized actions included but not limited to identity theft
A computer program that captures the keystrokes of a computer user and stores them. Modern keyloggers can store additional information, such as images of the user's screen. Most malicious keyloggers send this data to a third party remotely (such as via email).
Any program that records keystrokes is, technically, a key logger. The term tends to be used in malware circles for programs that surreptitiously record keystrokes and then make the log of keyboard activity available to someone other than the logged user(s).
A program, usually hidden, that records everything you type. Its purpose is to capture your passwords, credit card numbers, Web passwords, and other private info and send them back to someone.
This is a type of system monitor that has the ability to record ALL keystrokes on your computer. So a keylogger can record and log your e-mail conversations, chat room conversations, instant messages, and any other typed material. They have the ability to run in the background, hiding their presence. Primarily they are designed to allow a third parties to view your personal conversations and may gain access to private information such as your usernames, passwords, credit card numbers, etc.
Hardware or software that records clicks and button pushes. Parents can use it to monitor online activity; hackers use it to collect passwords, or account and credit card numbers.
a small hardware device or a program that records each keystroke typed on a particular keyboard for report back to an interested party, such as a marketer...
A keylogger is a type of system monitor that has the ability to record all keystrokes on your computer. Therefore, a keylogger can record and log your e-mail conversations, chat room conversations, instant messages, and any other typed material. They have the ability to run in the background, hiding their presence. Worst case scenario: A third party may be able to view your personal conversations and may gain access to private information such as your usernames, passwords, credit card numbers, or your Social Security number.
Sometimes called a keystroke logger, key logger, or system monitor, it is a small program that monitors each keystroke a user types on a computer's keyboard. Typically downloaded unwittingly as spyware, the keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
Any program that records keystrokes. The term tends to be mainly used for programs that surreptitiously record keystrokes and then make the log of keyboard activity available to someone other than the logged user(s). Commonly these log files are emailed to the person who planted the logging software, but on public access machines (in cyber-cafes, school and university computer labs, etc .) that level of sophistication is not necessary as the 'attacker' can simply access the log file from the compromised machine at a later date, revealing usernames and passwords for accessing other systems and other potentially sensitive information. Although more common in Trojan Horse programs and Remote Access Trojans, keyloggers are sometimes used in the payloads of viruses.
Keyloggers are just what they sound like--programs that record every keystroke made on a PC. Though some parental-control applications include keyloggers for monitoring purposes, the ones that come bundled with spyware are far more insidious. These types of keyloggers send sensitive information to a remote computer, where thieves can access data such as credit-card and bank-account numbers, as well as passwords and social-security numbers.
A Keylogger is a piece of malware which records either the presses of buttons on a keyboard or images from the screen which can then be sent across the Internet to other people thus breaching a user's privacy. See here if you believe you may have a keylogger on your computer. See also Malware.
Software that intercepts data between the user entering it and the intended recipient application. Trojan and PUP keyloggers which are functionally identical. McAfee® software detects both types of keyloggers to prevent privacy intrusions.
A computer program or a hardware device designed to steal personal information by recording everything a user types in, including e-mails, login names, passwords, credit card numbers and bank account information.