Document preview:

Introduction In the past years, access to information globally has become available at all time through the use of different network architectures and computers. Also, to the growth in chances of malicious attacks and intrusions have been in increase following a high innovation and high-level skills of the attackers. There exist multiple ways to highjack or hack users’ confidential information and sensitive data. Keyloggers are one of the most used methods to obtain users information, in which the users’ keystrokes are recorded and analyzed. Another method gaining fame is clickjacking. There also exists other inexpensive hardware keylogging devices like the Spy Keylogger that acts as a medium between the physical keyboard USB adapter and computer’s motherboard USB port.the Device captures and stores the user keystrokes on its memory. Also, the wireless hardware keyloggers have the capability to translate the information and store the encrypted keystroke information sent from a w...

$20
Enter valid email

Literature review of key logger project

LitTeacher1
This authors's rating is: 4.5 (166 reviews)

9 in Computer Science

241 completed projects

This might be interesting

Top work's preview
UmarAli
This work's rating is: 0
Top work's preview
MAVLink Protocol
devmien
This work's rating is: 5
Top work's preview
LitTeacher1
This work's rating is: 4.5
Top work's preview
devmien
This work's rating is: 5
Top work's preview
Article Rewrite
Young H
This work's rating is: 5