CINXE.COM

Keystroke logging - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Keystroke logging - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"0982e13a-1aa9-438e-82cf-d55742c46035","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Keystroke_logging","wgTitle":"Keystroke logging","wgCurRevisionId":1259868583,"wgRevisionId":1259868583,"wgArticleId":57829,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","Articles with short description","Short description is different from Wikidata","All articles with vague or ambiguous time","Vague or ambiguous time from January 2021","Wikipedia articles needing clarification from November 2017","Wikipedia articles needing clarification from January 2021","Commons category link from Wikidata","Cryptographic attacks","Spyware","Surveillance","Cybercrime","Security breaches"],"wgPageViewLanguage":"en", "wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Keystroke_logging","wgRelevantArticleId":57829,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":50000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q309396", "wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js", "ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Keystroke logging - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Keystroke_logging"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Keystroke_logging&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Keystroke_logging"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Keystroke_logging rootpage-Keystroke_logging skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Keystroke+logging" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Keystroke+logging" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Keystroke+logging" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Keystroke+logging" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Application_of_keylogger" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Application_of_keylogger"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Application of keylogger</span> </div> </a> <button aria-controls="toc-Application_of_keylogger-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Application of keylogger subsection</span> </button> <ul id="toc-Application_of_keylogger-sublist" class="vector-toc-list"> <li id="toc-Software-based_keyloggers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Software-based_keyloggers"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1</span> <span>Software-based keyloggers</span> </div> </a> <ul id="toc-Software-based_keyloggers-sublist" class="vector-toc-list"> <li id="toc-Keystroke_logging_in_writing_process_research" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Keystroke_logging_in_writing_process_research"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1.1</span> <span>Keystroke logging in writing process research</span> </div> </a> <ul id="toc-Keystroke_logging_in_writing_process_research-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Related_features" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Related_features"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.1.2</span> <span>Related features</span> </div> </a> <ul id="toc-Related_features-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Hardware-based_keyloggers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Hardware-based_keyloggers"> <div class="vector-toc-text"> <span class="vector-toc-numb">2.2</span> <span>Hardware-based keyloggers</span> </div> </a> <ul id="toc-Hardware-based_keyloggers-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Cracking" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Cracking"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Cracking</span> </div> </a> <button aria-controls="toc-Cracking-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Cracking subsection</span> </button> <ul id="toc-Cracking-sublist" class="vector-toc-list"> <li id="toc-Trojans" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Trojans"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Trojans</span> </div> </a> <ul id="toc-Trojans-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Use_by_police" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Use_by_police"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Use by police</span> </div> </a> <ul id="toc-Use_by_police-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Countermeasures" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#Countermeasures"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Countermeasures</span> </div> </a> <button aria-controls="toc-Countermeasures-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Countermeasures subsection</span> </button> <ul id="toc-Countermeasures-sublist" class="vector-toc-list"> <li id="toc-Anti-keyloggers" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Anti-keyloggers"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.1</span> <span>Anti-keyloggers</span> </div> </a> <ul id="toc-Anti-keyloggers-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Live_CD/USB" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Live_CD/USB"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.2</span> <span>Live CD/USB</span> </div> </a> <ul id="toc-Live_CD/USB-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Anti-spyware_/_Anti-virus_programs" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Anti-spyware_/_Anti-virus_programs"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.3</span> <span>Anti-spyware / Anti-virus programs</span> </div> </a> <ul id="toc-Anti-spyware_/_Anti-virus_programs-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Network_monitors" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Network_monitors"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.4</span> <span>Network monitors</span> </div> </a> <ul id="toc-Network_monitors-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Automatic_form_filler_programs" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Automatic_form_filler_programs"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.5</span> <span>Automatic form filler programs</span> </div> </a> <ul id="toc-Automatic_form_filler_programs-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-One-time_passwords_(OTP)" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#One-time_passwords_(OTP)"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.6</span> <span>One-time passwords (OTP)</span> </div> </a> <ul id="toc-One-time_passwords_(OTP)-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Security_tokens" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Security_tokens"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.7</span> <span>Security tokens</span> </div> </a> <ul id="toc-Security_tokens-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-On-screen_keyboards" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#On-screen_keyboards"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.8</span> <span>On-screen keyboards</span> </div> </a> <ul id="toc-On-screen_keyboards-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Keystroke_interference_software" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Keystroke_interference_software"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.9</span> <span>Keystroke interference software</span> </div> </a> <ul id="toc-Keystroke_interference_software-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Speech_recognition" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Speech_recognition"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.10</span> <span>Speech recognition</span> </div> </a> <ul id="toc-Speech_recognition-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Handwriting_recognition_and_mouse_gestures" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Handwriting_recognition_and_mouse_gestures"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.11</span> <span>Handwriting recognition and mouse gestures</span> </div> </a> <ul id="toc-Handwriting_recognition_and_mouse_gestures-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Macro_expanders/recorders" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Macro_expanders/recorders"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.12</span> <span>Macro expanders/recorders</span> </div> </a> <ul id="toc-Macro_expanders/recorders-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Deceptive_typing" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Deceptive_typing"> <div class="vector-toc-text"> <span class="vector-toc-numb">4.13</span> <span>Deceptive typing</span> </div> </a> <ul id="toc-Deceptive_typing-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1 vector-toc-list-item-expanded"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Keystroke logging</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 42 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-42" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">42 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%B1%D8%A7%D8%B5%D8%AF_%D9%84%D9%88%D8%AD%D8%A9_%D9%85%D9%81%D8%A7%D8%AA%D9%8A%D8%AD" title="راصد لوحة مفاتيح – Arabic" lang="ar" hreflang="ar" data-title="راصد لوحة مفاتيح" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Keylogger" title="Keylogger – Azerbaijani" lang="az" hreflang="az" data-title="Keylogger" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%95%E0%A7%80%E0%A6%B8%E0%A7%8D%E0%A6%9F%E0%A7%8D%E0%A6%B0%E0%A7%8B%E0%A6%95_%E0%A6%B2%E0%A6%97%E0%A6%BF%E0%A6%82" title="কীস্ট্রোক লগিং – Bangla" lang="bn" hreflang="bn" data-title="কীস্ট্রোক লগিং" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Keylogger" title="Keylogger – Catalan" lang="ca" hreflang="ca" data-title="Keylogger" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Keylogger" title="Keylogger – Czech" lang="cs" hreflang="cs" data-title="Keylogger" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Keylogger" title="Keylogger – Danish" lang="da" hreflang="da" data-title="Keylogger" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Keylogger" title="Keylogger – German" lang="de" hreflang="de" data-title="Keylogger" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Klahvinuhk" title="Klahvinuhk – Estonian" lang="et" hreflang="et" data-title="Klahvinuhk" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%9A%CE%B1%CF%84%CE%B1%CE%B3%CF%81%CE%B1%CF%86%CE%AE_%CF%80%CE%BB%CE%B7%CE%BA%CF%84%CF%81%CE%BF%CE%BB%CF%8C%CE%B3%CE%B7%CF%83%CE%B7%CF%82" title="Καταγραφή πληκτρολόγησης – Greek" lang="el" hreflang="el" data-title="Καταγραφή πληκτρολόγησης" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Keylogger" title="Keylogger – Spanish" lang="es" hreflang="es" data-title="Keylogger" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Keylogger" title="Keylogger – Basque" lang="eu" hreflang="eu" data-title="Keylogger" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%DA%A9%DB%8C%E2%80%8C%D9%84%D8%A7%DA%AF%D8%B1" title="کی‌لاگر – Persian" lang="fa" hreflang="fa" data-title="کی‌لاگر" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Enregistreur_de_frappe" title="Enregistreur de frappe – French" lang="fr" hreflang="fr" data-title="Enregistreur de frappe" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-gl mw-list-item"><a href="https://gl.wikipedia.org/wiki/Keylogger" title="Keylogger – Galician" lang="gl" hreflang="gl" data-title="Keylogger" data-language-autonym="Galego" data-language-local-name="Galician" class="interlanguage-link-target"><span>Galego</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%ED%82%A4%EB%A1%9C%EA%B9%85" title="키로깅 – Korean" lang="ko" hreflang="ko" data-title="키로깅" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Perekam_ketikan" title="Perekam ketikan – Indonesian" lang="id" hreflang="id" data-title="Perekam ketikan" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-xh mw-list-item"><a href="https://xh.wikipedia.org/wiki/Isitshixo_sokuloga" title="Isitshixo sokuloga – Xhosa" lang="xh" hreflang="xh" data-title="Isitshixo sokuloga" data-language-autonym="IsiXhosa" data-language-local-name="Xhosa" class="interlanguage-link-target"><span>IsiXhosa</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Keylogger" title="Keylogger – Italian" lang="it" hreflang="it" data-title="Keylogger" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%A8%D7%99%D7%A9%D7%95%D7%9D_%D7%94%D7%A7%D7%A9%D7%95%D7%AA" title="רישום הקשות – Hebrew" lang="he" hreflang="he" data-title="רישום הקשות" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-lmo mw-list-item"><a href="https://lmo.wikipedia.org/wiki/Keylogger" title="Keylogger – Lombard" lang="lmo" hreflang="lmo" data-title="Keylogger" data-language-autonym="Lombard" data-language-local-name="Lombard" class="interlanguage-link-target"><span>Lombard</span></a></li><li class="interlanguage-link interwiki-ml mw-list-item"><a href="https://ml.wikipedia.org/wiki/%E0%B4%95%E0%B5%80%E0%B4%B8%E0%B5%8D%E0%B4%9F%E0%B5%8D%E0%B4%B0%E0%B5%8B%E0%B4%95%E0%B5%8D%E0%B4%95%E0%B5%8D_%E0%B4%B2%E0%B5%8B%E0%B4%97%E0%B4%BF%E0%B4%82%E0%B4%97%E0%B5%8D" title="കീസ്ട്രോക്ക് ലോഗിംഗ് – Malayalam" lang="ml" hreflang="ml" data-title="കീസ്ട്രോക്ക് ലോഗിംഗ്" data-language-autonym="മലയാളം" data-language-local-name="Malayalam" class="interlanguage-link-target"><span>മലയാളം</span></a></li><li class="interlanguage-link interwiki-my mw-list-item"><a href="https://my.wikipedia.org/wiki/%E1%80%81%E1%80%9C%E1%80%AF%E1%80%90%E1%80%BA%E1%80%9B%E1%80%AD%E1%80%AF%E1%80%80%E1%80%BA%E1%80%81%E1%80%BB%E1%80%80%E1%80%BA_%E1%80%99%E1%80%BE%E1%80%90%E1%80%BA%E1%80%90%E1%80%99%E1%80%BA%E1%80%B8%E1%80%90%E1%80%84%E1%80%BA%E1%80%81%E1%80%BC%E1%80%84%E1%80%BA%E1%80%B8" title="ခလုတ်ရိုက်ချက် မှတ်တမ်းတင်ခြင်း – Burmese" lang="my" hreflang="my" data-title="ခလုတ်ရိုက်ချက် မှတ်တမ်းတင်ခြင်း" data-language-autonym="မြန်မာဘာသာ" data-language-local-name="Burmese" class="interlanguage-link-target"><span>မြန်မာဘာသာ</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Keylogger" title="Keylogger – Dutch" lang="nl" hreflang="nl" data-title="Keylogger" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%82%AD%E3%83%BC%E3%83%AD%E3%82%AC%E3%83%BC" title="キーロガー – Japanese" lang="ja" hreflang="ja" data-title="キーロガー" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Keylogger" title="Keylogger – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Keylogger" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-ps mw-list-item"><a href="https://ps.wikipedia.org/wiki/%DA%A9%D9%8A_%D9%84%D8%A7%DA%AB%D8%B1" title="کي لاګر – Pashto" lang="ps" hreflang="ps" data-title="کي لاګر" data-language-autonym="پښتو" data-language-local-name="Pashto" class="interlanguage-link-target"><span>پښتو</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Keylogger" title="Keylogger – Polish" lang="pl" hreflang="pl" data-title="Keylogger" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Keylogger" title="Keylogger – Portuguese" lang="pt" hreflang="pt" data-title="Keylogger" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Keylogger" title="Keylogger – Romanian" lang="ro" hreflang="ro" data-title="Keylogger" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%9A%D0%B5%D0%B9%D0%BB%D0%BE%D0%B3%D0%B5%D1%80" title="Кейлогер – Russian" lang="ru" hreflang="ru" data-title="Кейлогер" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Keystroke_logging" title="Keystroke logging – Simple English" lang="en-simple" hreflang="en-simple" data-title="Keystroke logging" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/Keylogger" title="Keylogger – Slovak" lang="sk" hreflang="sk" data-title="Keylogger" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Bele%C5%BEnik_tipkanja" title="Beležnik tipkanja – Slovenian" lang="sl" hreflang="sl" data-title="Beležnik tipkanja" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%DA%A9%D9%84%DB%8C%D9%84%D8%AF%D8%B2" title="کلیلدز – Central Kurdish" lang="ckb" hreflang="ckb" data-title="کلیلدز" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/N%C3%A4pp%C3%A4ilytallennin" title="Näppäilytallennin – Finnish" lang="fi" hreflang="fi" data-title="Näppäilytallennin" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Keylogger" title="Keylogger – Swedish" lang="sv" hreflang="sv" data-title="Keylogger" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-shn mw-list-item"><a href="https://shn.wikipedia.org/wiki/%E1%80%9C%E1%80%BD%E1%80%84%E1%80%BA%E1%82%88%E1%80%99%E1%81%A2%E1%82%86%E1%80%90%E1%81%A2%E1%80%84%E1%80%BA%E1%82%87_%E1%81%B5%E1%81%A2%E1%81%BC%E1%80%BA%E1%81%BC%E1%80%B5%E1%81%B5%E1%80%BA%E1%80%B8%E1%81%BC%E1%80%B5%E1%81%BC%E1%80%BA" title="လွင်ႈမၢႆတၢင်ႇ ၵၢၼ်ၼဵၵ်းၼဵၼ် – Shan" lang="shn" hreflang="shn" data-title="လွင်ႈမၢႆတၢင်ႇ ၵၢၼ်ၼဵၵ်းၼဵၼ်" data-language-autonym="ၽႃႇသႃႇတႆး " data-language-local-name="Shan" class="interlanguage-link-target"><span>ၽႃႇသႃႇတႆး </span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Klavye_dinleme_sistemi" title="Klavye dinleme sistemi – Turkish" lang="tr" hreflang="tr" data-title="Klavye dinleme sistemi" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/Keylogger" title="Keylogger – Ukrainian" lang="uk" hreflang="uk" data-title="Keylogger" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/Keylogger" title="Keylogger – Vietnamese" lang="vi" hreflang="vi" data-title="Keylogger" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E9%8D%B5%E7%9B%A4%E5%81%B4%E9%8C%84" title="鍵盤側錄 – Cantonese" lang="yue" hreflang="yue" data-title="鍵盤側錄" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E9%94%AE%E7%9B%98%E8%AE%B0%E5%BD%95" title="键盘记录 – Chinese" lang="zh" hreflang="zh" data-title="键盘记录" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q309396#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Keystroke_logging" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Keystroke_logging" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Keystroke_logging"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Keystroke_logging&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Keystroke_logging&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Keystroke_logging"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Keystroke_logging&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Keystroke_logging&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Keystroke_logging" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Keystroke_logging" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Keystroke_logging&amp;oldid=1259868583" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Keystroke_logging&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Keystroke_logging&amp;id=1259868583&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FKeystroke_logging"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FKeystroke_logging"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Keystroke_logging&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Keystroke_logging&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Keystroke_logging" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q309396" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Action of recording the keys struck on a keyboard</div> <p><b>Keystroke logging</b>, often referred to as <b>keylogging</b> or <b>keyboard capturing</b>, is the action of recording (logging) the keys struck on a <a href="/wiki/Keyboard_technology" title="Keyboard technology">keyboard</a>,<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup> typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A <b>keystroke recorder</b> or <b>keylogger</b> can be either <a href="/wiki/Software" title="Software">software</a> or <a href="/wiki/Computer_hardware" title="Computer hardware">hardware</a>. </p><p>While the programs themselves are legal,<sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> with many designed to allow employers to oversee the use of their computers, keyloggers are most often used for stealing passwords and other <a href="/wiki/Confidential_information" class="mw-redirect" title="Confidential information">confidential information</a>.<sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> Keystroke logging can also be utilized to monitor activities of children in schools or at home and by law enforcement officials to investigate malicious usage.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> </p><p>Keylogging can also be used to study <a href="/wiki/Keystroke_dynamics" title="Keystroke dynamics">keystroke dynamics</a><sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> or <a href="/wiki/Human%E2%80%93computer_interaction" title="Human–computer interaction">human-computer interaction</a>. Numerous keylogging methods exist, ranging from hardware and <a href="/wiki/Software" title="Software">software</a>-based approaches to acoustic cryptanalysis. </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In the mid-1970s, the <a href="/wiki/Soviet_Union" title="Soviet Union">Soviet Union</a> developed and deployed a hardware keylogger targeting <a href="/wiki/Typewriter" title="Typewriter">typewriters</a>. Termed the "selectric bug", it measured the movements of the print head of IBM Selectric typewriters via subtle influences on the regional magnetic field caused by the rotation and movements of the print head.<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> An early keylogger was written by <a href="/wiki/Perry_Kivolowitz" title="Perry Kivolowitz">Perry Kivolowitz</a> and posted to the Usenet newsgroup net.unix-wizards, net.sources on November 17, 1983.<sup id="cite_ref-9" class="reference"><a href="#cite_note-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> The posting seems to be a motivating factor in restricting access to <code>/dev/kmem</code> on <a href="/wiki/Unix" title="Unix">Unix</a> systems. The <a href="/wiki/User-mode" class="mw-redirect" title="User-mode">user-mode</a> program operated by locating and dumping character lists (clients) as they were assembled in the Unix kernel. </p><p>In the 1970s, spies installed keystroke loggers in the <a href="/wiki/Embassy_of_the_United_States,_Moscow" title="Embassy of the United States, Moscow">US Embassy</a> and Consulate buildings in <a href="/wiki/Moscow" title="Moscow">Moscow</a>.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-ingersoll_11-0" class="reference"><a href="#cite_note-ingersoll-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> They installed the bugs in <a href="/wiki/Selectric" class="mw-redirect" title="Selectric">Selectric</a> II and Selectric III electric typewriters.<sup id="cite_ref-gunman_12-0" class="reference"><a href="#cite_note-gunman-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> </p><p>Soviet embassies used manual typewriters, rather than electric typewriters, for <a href="/wiki/Classified_information" title="Classified information">classified information</a>—apparently because they are immune to such bugs.<sup id="cite_ref-gunman_12-1" class="reference"><a href="#cite_note-gunman-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> As of 2013, Russian special services still use typewriters.<sup id="cite_ref-ingersoll_11-1" class="reference"><a href="#cite_note-ingersoll-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Application_of_keylogger">Application of keylogger</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=2" title="Edit section: Application of keylogger"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Software-based_keyloggers">Software-based keyloggers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=3" title="Edit section: Software-based keyloggers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Keylogger-screen-capture-example.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/2/22/Keylogger-screen-capture-example.png/400px-Keylogger-screen-capture-example.png" decoding="async" width="400" height="300" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/2/22/Keylogger-screen-capture-example.png/600px-Keylogger-screen-capture-example.png 1.5x, //upload.wikimedia.org/wikipedia/commons/2/22/Keylogger-screen-capture-example.png 2x" data-file-width="800" data-file-height="600" /></a><figcaption>A keylogger example of a screen capture, which holds potentially confidential and private information. The image below holds the corresponding keylogger text result.</figcaption></figure> <figure class="mw-default-size mw-halign-right" typeof="mw:File/Thumb"><a href="/wiki/File:Keylogger-software-logfile-example.jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c4/Keylogger-software-logfile-example.jpg/400px-Keylogger-software-logfile-example.jpg" decoding="async" width="400" height="286" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c4/Keylogger-software-logfile-example.jpg/600px-Keylogger-software-logfile-example.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/c/c4/Keylogger-software-logfile-example.jpg 2x" data-file-width="800" data-file-height="571" /></a><figcaption>A <a href="/wiki/Logfile" class="mw-redirect" title="Logfile">logfile</a> from a software-based keylogger, based on the screen capture above</figcaption></figure> <p>A software-based keylogger is a computer program designed to record any input from the keyboard.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> Keyloggers are used in <a href="/wiki/Information_technology" title="Information technology">IT</a> organizations to troubleshoot technical problems with computers and business networks. Families and businesspeople use keyloggers legally to monitor network usage without their users' direct knowledge. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> publicly stated that <a href="/wiki/Windows_10" title="Windows 10">Windows 10</a> has a built-in keylogger in its final version "to improve typing and writing services".<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup> However, malicious individuals can use keyloggers on public computers to steal passwords or credit card information. Most keyloggers are not stopped by <a href="/wiki/HTTP_Secure" class="mw-redirect" title="HTTP Secure">HTTPS</a> encryption because that only protects <a href="/wiki/Data_in_transit" title="Data in transit">data in transit</a> between computers; software-based keyloggers run on the affected user's computer, reading keyboard inputs directly as the user types. </p><p>From a technical perspective, there are several categories: </p> <ul><li><b>Hypervisor-based</b>: The keylogger can theoretically reside in a <a href="/wiki/Malware" title="Malware">malware</a> <a href="/wiki/Hypervisor" title="Hypervisor">hypervisor</a> running underneath the operating system, which thus remains untouched. It effectively becomes a <a href="/wiki/Virtual_machine" title="Virtual machine">virtual machine</a>. <a href="/wiki/Blue_Pill_(software)" title="Blue Pill (software)">Blue Pill</a> is a conceptual example.</li> <li><b><a href="/wiki/Kernel_(operating_system)" title="Kernel (operating system)">Kernel</a>-based</b>: A program on the machine obtains <a href="/wiki/Superuser" title="Superuser">root access</a> to hide in the OS and intercepts keystrokes that pass through the kernel. This method is difficult both to write and to combat. Such keyloggers reside at the <a href="/wiki/Ring_(computer_security)" class="mw-redirect" title="Ring (computer security)">kernel level</a>, which makes them difficult to detect, especially for user-mode applications that do not have root access. They are frequently implemented as <a href="/wiki/Rootkit" title="Rootkit">rootkits</a> that subvert the operating system kernel to gain unauthorized access to the hardware. This makes them very powerful. A keylogger using this method can act as a keyboard <a href="/wiki/Device_driver" title="Device driver">device driver</a>, for example, and thus gain access to any information typed on the keyboard as it goes to the operating system.</li> <li><b>API-based</b>: These keyloggers <a href="/wiki/Hooking" title="Hooking">hook</a> keyboard <a href="/wiki/Application_programming_interface" class="mw-redirect" title="Application programming interface">APIs</a> inside a running application. The keylogger registers keystroke events as if it was a normal piece of the application instead of malware. The keylogger receives an <a href="/wiki/Event_(computing)" title="Event (computing)">event</a> each time the user presses or releases a key. The keylogger simply records it. <ul><li>Windows APIs such as <code>GetAsyncKeyState()</code>, <code>GetForegroundWindow()</code>, etc. are used to poll the state of the keyboard or to subscribe to keyboard events.<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> A more recent<sup class="noprint Inline-Template" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Manual_of_Style/Dates_and_numbers#Chronological_items" title="Wikipedia:Manual of Style/Dates and numbers"><span title="The time period mentioned near this tag is ambiguous. (January 2021)">when?</span></a></i>&#93;</sup> example simply polls the <a href="/wiki/BIOS" title="BIOS">BIOS</a> for pre-boot authentication <a href="/wiki/Personal_identification_number" title="Personal identification number">PINs</a> that have not been cleared from memory.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup></li></ul></li> <li><b>Form grabbing based</b>: <a href="/wiki/Form_grabbing" title="Form grabbing">Form grabbing</a>-based keyloggers log <a href="/wiki/Form_(web)" class="mw-redirect" title="Form (web)">Web form</a> submissions by recording the form data on submit events. This happens when the user completes a form and submits it, usually by clicking a button or pressing enter. This type of keylogger records form data before it is passed over the Internet.</li> <li><b>JavaScript-based:</b> A malicious script tag is injected into a targeted web page, and listens for key events such as <code>onKeyUp()</code>. Scripts can be injected via a variety of methods, including <a href="/wiki/Cross-site_scripting" title="Cross-site scripting">cross-site scripting</a>, <a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">man-in-the-browser</a>, <a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">man-in-the-middle</a>, or a compromise of the remote website.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup></li> <li><b>Memory-injection-based</b>: Memory Injection (<a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">MitB</a>)-based keyloggers perform their logging function by altering the memory tables associated with the browser and other system functions. By patching the memory tables or injecting directly into memory, this technique can be used by malware authors to bypass Windows UAC (User Account Control). The <a href="/wiki/Zeus_(malware)" title="Zeus (malware)">Zeus</a> and <a href="/wiki/SpyEye_trojan" class="mw-redirect" title="SpyEye trojan">SpyEye</a> trojans use this method exclusively.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> Non-Windows systems have protection mechanisms that allow access to locally recorded data from a remote location.<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="Sentence is not grammatically sensible. (November 2017)">clarification needed</span></a></i>&#93;</sup> Remote communication may be achieved when one of these methods is used: <ul><li>Data is uploaded to a website, database or an <a href="/wiki/File_Transfer_Protocol" title="File Transfer Protocol">FTP</a> server.</li> <li>Data is periodically emailed to a pre-defined <a href="/wiki/Email_address" title="Email address">email address</a>.</li> <li>Data is <a href="/wiki/Wireless" title="Wireless">wirelessly</a> transmitted employing an attached hardware system.</li> <li>The software enables a remote login to the local machine from the Internet or the local network, for data logs stored on the target machine.</li></ul></li></ul> <div class="mw-heading mw-heading4"><h4 id="Keystroke_logging_in_writing_process_research">Keystroke logging in writing process research</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=4" title="Edit section: Keystroke logging in writing process research"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Since 2006, keystroke logging has been an established research method for the study of writing processes.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup> Different programs have been developed to collect online process data of writing activities,<sup id="cite_ref-AAA_23-0" class="reference"><a href="#cite_note-AAA-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> including <a href="/wiki/Inputlog" title="Inputlog">Inputlog</a>, Scriptlog, Translog and GGXLog. </p><p>Keystroke logging is used legitimately as a suitable research instrument in several writing contexts. These include studies on cognitive writing processes, which include </p> <ul><li>descriptions of writing strategies; the writing development of children (with and without writing difficulties),</li> <li>spelling,</li> <li>first and second language writing, and</li> <li>specialist skill areas such as translation and subtitling.</li></ul> <p>Keystroke logging can be used to research writing, specifically. It can also be integrated into educational domains for second language learning, programming skills, and typing skills. </p> <div class="mw-heading mw-heading4"><h4 id="Related_features">Related features</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=5" title="Edit section: Related features"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Software keyloggers may be augmented with features that capture user information without relying on keyboard key presses as the sole input. Some of these features include: </p> <ul><li>Clipboard logging. Anything that has been copied to the <a href="/wiki/Clipboard_(software)" class="mw-redirect" title="Clipboard (software)">clipboard</a> can be captured by the program.</li> <li>Screen logging. <a href="/wiki/Screenshot" title="Screenshot">Screenshots</a> are taken to capture graphics-based information. Applications with screen logging abilities may take screenshots of the whole screen, of just one application, or even just around the mouse cursor. They may take these screenshots periodically or in response to user behaviors (for example, when a user clicks the mouse). Screen logging can be used to capture data inputted with an on-screen keyboard.</li> <li>Programmatically capturing the text in a <a href="/wiki/GUI_widget" class="mw-redirect" title="GUI widget">control</a>. The <a href="/wiki/Microsoft_Windows" title="Microsoft Windows">Microsoft Windows</a> <a href="/wiki/Application_programming_interface" class="mw-redirect" title="Application programming interface">API</a> allows programs to request the text 'value' in some controls. This means that some passwords may be captured, even if they are hidden behind password masks (usually asterisks).<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup></li> <li>The recording of every program/folder/window opened including a screenshot of every website visited.</li> <li>The recording of <a href="/wiki/Web_search_query" class="mw-redirect" title="Web search query">search engines queries</a>, <a href="/wiki/Instant_messenger" class="mw-redirect" title="Instant messenger">instant messenger</a> conversations, FTP downloads and other Internet-based activities (including the bandwidth used).</li></ul> <div class="mw-heading mw-heading3"><h3 id="Hardware-based_keyloggers">Hardware-based keyloggers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=6" title="Edit section: Hardware-based keyloggers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:USB_Hardware_Keylogger.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/1/1e/USB_Hardware_Keylogger.jpg/220px-USB_Hardware_Keylogger.jpg" decoding="async" width="220" height="197" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/1/1e/USB_Hardware_Keylogger.jpg/330px-USB_Hardware_Keylogger.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/1/1e/USB_Hardware_Keylogger.jpg/440px-USB_Hardware_Keylogger.jpg 2x" data-file-width="4095" data-file-height="3660" /></a><figcaption>A hardware-based keylogger</figcaption></figure> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Usb-logger.jpg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/5/57/Usb-logger.jpg/220px-Usb-logger.jpg" decoding="async" width="220" height="142" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/5/57/Usb-logger.jpg/330px-Usb-logger.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/5/57/Usb-logger.jpg/440px-Usb-logger.jpg 2x" data-file-width="465" data-file-height="300" /></a><figcaption>A connected hardware-based keylogger</figcaption></figure> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Hardware_keylogger" title="Hardware keylogger">Hardware keylogger</a></div> <p>Hardware-based keyloggers do not depend upon any software being installed as they exist at a hardware level in a computer system. </p> <ul><li>Firmware-based: <a href="/wiki/BIOS" title="BIOS">BIOS</a>-level <a href="/wiki/Firmware" title="Firmware">firmware</a> that handles keyboard events can be modified to record these events as they are processed. Physical and/or <a href="/wiki/Superuser" title="Superuser">root-level access</a> is required to the machine, and the software loaded into the BIOS needs to be created for the specific hardware that it will be running on.<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup></li> <li>Keyboard hardware: Hardware keyloggers are used for keystroke logging utilizing a hardware circuit that is attached somewhere in between the <a href="/wiki/Computer_keyboard" title="Computer keyboard">computer keyboard</a> and the computer, typically inline with the keyboard's cable connector. There are also <a href="/wiki/Universal_Serial_Bus" class="mw-redirect" title="Universal Serial Bus">USB</a> connector-based hardware keyloggers, as well as ones for laptop computers (the Mini-PCI card plugs into the expansion slot of a laptop). More stealthy implementations can be installed or built into standard keyboards so that no device is visible on the external cable. Both types log all keyboard activity to their <a href="/wiki/Primary_storage" class="mw-redirect" title="Primary storage">internal memory</a>, which can be subsequently accessed, for example, by typing in a secret key sequence. Hardware keyloggers do not require any software to be installed on a target user's computer, therefore not interfering with the computer's operation and less likely to be detected by software running on it. However, its physical presence may be detected if, for example, it is installed outside the case as an inline device between the computer and the keyboard. Some of these implementations can be controlled and monitored remotely using a wireless communication standard.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup></li> <li>Wireless keyboard and mouse sniffers: These passive sniffers collect packets of data being transferred from a wireless keyboard and its receiver. As encryption may be used to secure the wireless communications between the two devices, this may need to be cracked beforehand if the transmissions are to be read. In some cases, this enables an attacker to type arbitrary commands into a victim's computer.<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup></li> <li>Keyboard overlays: Criminals have been known to use keyboard overlays on <a href="/wiki/Automated_teller_machine" class="mw-redirect" title="Automated teller machine">ATMs</a> to capture people's PINs. Each keypress is registered by the keyboard of the ATM as well as the criminal's keypad that is placed over it. The device is designed to look like an integrated part of the machine so that bank customers are unaware of its presence.<sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup></li> <li>Acoustic keyloggers: <a href="/wiki/Acoustic_cryptanalysis" title="Acoustic cryptanalysis">Acoustic cryptanalysis</a> can be used to monitor the sound created by someone typing on a computer. Each key on the keyboard makes a subtly different acoustic signature when struck. It is then possible to identify which keystroke signature relates to which keyboard character via <a href="/wiki/Statistics" title="Statistics">statistical methods</a> such as <a href="/wiki/Frequency_analysis" title="Frequency analysis">frequency analysis</a>. The repetition frequency of similar acoustic keystroke signatures, the timings between different keyboard strokes and other context information such as the probable language in which the user is writing are used in this analysis to map sounds to letters.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> A fairly long recording (1000 or more keystrokes) is required so that a large enough <a href="/wiki/Sample_(statistics)" class="mw-redirect" title="Sample (statistics)">sample</a> is collected.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup></li> <li>Electromagnetic emissions: It is possible to capture the <a href="/wiki/Electromagnetic_radiation" title="Electromagnetic radiation">electromagnetic emissions</a> of a wired keyboard from up to 20 metres (66&#160;ft) away, without being physically wired to it.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> In 2009, Swiss researchers tested 11 different <a href="/wiki/Universal_Serial_Bus" class="mw-redirect" title="Universal Serial Bus">USB</a>, <a href="/wiki/IBM_Personal_System/2" class="mw-redirect" title="IBM Personal System/2">PS/2</a> and laptop keyboards in a semi-<a href="/wiki/Anechoic_chamber" title="Anechoic chamber">anechoic chamber</a> and found them all vulnerable, primarily because of the prohibitive cost of adding <a href="/wiki/Electromagnetic_shielding" title="Electromagnetic shielding">shielding</a> during manufacture.<sup id="cite_ref-32" class="reference"><a href="#cite_note-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> The researchers used a wide-band <a href="/wiki/Receiver_(radio)" class="mw-redirect" title="Receiver (radio)">receiver</a> to tune into the specific frequency of the emissions radiated from the keyboards.</li> <li>Optical surveillance: Optical surveillance, while not a keylogger in the classical sense, is nonetheless an approach that can be used to capture passwords or PINs. A strategically placed camera, such as a hidden <a href="/wiki/Surveillance_camera" class="mw-redirect" title="Surveillance camera">surveillance camera</a> at an <a href="/wiki/Automated_teller_machine" class="mw-redirect" title="Automated teller machine">ATM</a>, can allow a criminal to watch a PIN or password being entered.<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-34" class="reference"><a href="#cite_note-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup></li> <li>Physical evidence: For a keypad that is used only to enter a security code, the keys which are in actual use will have evidence of use from many fingerprints. A passcode of four digits, if the four digits in question are known, is reduced from 10,000 possibilities to just 24 possibilities (10<sup>4</sup> versus 4! [<a href="/wiki/Factorial" title="Factorial">factorial</a> of 4]). These could then be used on separate occasions for a manual "brute force attack".</li> <li><a href="/wiki/Smartphone" title="Smartphone">Smartphone</a> sensors: Researchers have demonstrated that it is possible to capture the keystrokes of nearby computer keyboards using only the commodity <a href="/wiki/Accelerometer" title="Accelerometer">accelerometer</a> found in smartphones.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup> The attack is made possible by placing a smartphone near a keyboard on the same desk. The smartphone's accelerometer can then detect the vibrations created by typing on the keyboard and then translate this raw accelerometer signal into readable sentences with as much as 80 percent accuracy. The technique involves working through probability by detecting pairs of keystrokes, rather than individual keys. It models "keyboard events" in pairs and then works out whether the pair of keys pressed is on the left or the right side of the keyboard and whether they are close together or far apart on the <a href="/wiki/QWERTY" title="QWERTY">QWERTY</a> keyboard. Once it has worked this out, it compares the results to a preloaded dictionary where each word has been broken down in the same way.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> Similar techniques have also been shown to be effective at capturing keystrokes on touchscreen keyboards<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> while in some cases, in combination with <a href="/wiki/Gyroscope" title="Gyroscope">gyroscope</a><sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> or with the ambient-light sensor.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup></li> <li>Body keyloggers: Body keyloggers track and analyze body movements to determine which keys were pressed. The attacker needs to be familiar with the keys layout of the tracked keyboard to correlate between body movements and keys position, although with a suitably large sample this can be deduced. Tracking audible signals of the user' interface (e.g. a sound the device produce to informs the user that a keystroke was logged) may reduce the complexity of the body keylogging algorithms, as it marks the moment at which a key was pressed.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup></li></ul> <div class="mw-heading mw-heading2"><h2 id="Cracking">Cracking</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=7" title="Edit section: Cracking"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Writing simple software applications for keylogging can be trivial, and like any nefarious computer program, can be distributed as a <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">trojan horse</a> or as part of a <a href="/wiki/Computer_virus" title="Computer virus">virus</a>. What is not trivial for an attacker, however, is installing a covert keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or <a href="/wiki/IP_address" title="IP address">IP address</a> risks exposing the attacker. </p> <div class="mw-heading mw-heading3"><h3 id="Trojans">Trojans</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=8" title="Edit section: Trojans"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Researchers Adam Young and Moti Yung discussed several methods of sending keystroke logging. They presented a deniable password snatching attack in which the keystroke logging trojan is installed using a virus or <a href="/wiki/Computer_worm" title="Computer worm">worm</a>. An attacker who is caught with the virus or worm can claim to be a victim. The <a href="/wiki/Cryptotrojan" class="mw-redirect" title="Cryptotrojan">cryptotrojan</a> asymmetrically encrypts the pilfered login/password pairs using the <a href="/wiki/Public_key" class="mw-redirect" title="Public key">public key</a> of the trojan author and covertly broadcasts the resulting <a href="/wiki/Ciphertext" title="Ciphertext">ciphertext</a>. They mentioned that the ciphertext can be <a href="/wiki/Steganography" title="Steganography">steganographically</a> encoded and posted to a public bulletin board such as <a href="/wiki/Usenet" title="Usenet">Usenet</a>.<sup id="cite_ref-auto_44-0" class="reference"><a href="#cite_note-auto-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Use_by_police">Use by police</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=9" title="Edit section: Use by police"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>In 2000, the <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">FBI</a> used FlashCrest iSpy to obtain the <a href="/wiki/Pretty_Good_Privacy" title="Pretty Good Privacy">PGP</a> <a href="/wiki/Passphrase" title="Passphrase">passphrase</a> of <a href="/wiki/Nicodemo_Scarfo,_Jr." class="mw-redirect" title="Nicodemo Scarfo, Jr.">Nicodemo Scarfo, Jr.</a>, son of mob boss <a href="/wiki/Nicodemo_Scarfo" title="Nicodemo Scarfo">Nicodemo Scarfo</a>.<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> Also in 2000, the FBI lured two suspected Russian <a href="/wiki/Cybercriminal" class="mw-redirect" title="Cybercriminal">cybercriminals</a> to the US in an elaborate ruse, and captured their usernames and passwords with a keylogger that was covertly installed on a machine that they used to access their computers in <a href="/wiki/Russia" title="Russia">Russia</a>. The FBI then used these credentials to gain access to the suspects' computers in Russia to obtain evidence to prosecute them.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Countermeasures">Countermeasures</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=10" title="Edit section: Countermeasures"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>The effectiveness of countermeasures varies because keyloggers use a variety of techniques to capture data and the countermeasure needs to be effective against the particular data capture technique. In the case of Windows 10 keylogging by Microsoft, changing certain privacy settings may disable it.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> An on-screen keyboard will be effective against hardware keyloggers; transparency<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="(January 2021)">clarification needed</span></a></i>&#93;</sup> will defeat some—but not all—screen loggers. An <a href="/wiki/Anti-spyware" class="mw-redirect" title="Anti-spyware">anti-spyware</a> application that can only disable hook-based keyloggers will be ineffective against kernel-based keyloggers. </p><p>Keylogger program authors may be able to update their program's code to adapt to countermeasures that have proven effective against it. </p> <div class="mw-heading mw-heading3"><h3 id="Anti-keyloggers">Anti-keyloggers</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=11" title="Edit section: Anti-keyloggers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></div> <p>An <a href="/wiki/Anti-keylogger" title="Anti-keylogger">anti-keylogger</a> is a piece of <a href="/wiki/Software" title="Software">software</a> specifically designed to detect keyloggers on a computer, typically comparing all files in the computer against a database of keyloggers, looking for similarities which might indicate the presence of a hidden keylogger. As anti-keyloggers have been designed specifically to detect keyloggers, they have the potential to be more effective than conventional antivirus software; some antivirus software do not consider keyloggers to be malware, as under some circumstances a keylogger can be considered a legitimate piece of software.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Live_CD/USB"><span id="Live_CD.2FUSB"></span>Live CD/USB</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=12" title="Edit section: Live CD/USB"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Rebooting the computer using a <a href="/wiki/Live_CD" title="Live CD">Live CD</a> or write-protected <a href="/wiki/Live_USB" title="Live USB">Live USB</a> is a possible countermeasure against software keyloggers if the CD is clean of malware and the operating system contained on it is secured and fully patched so that it cannot be infected as soon as it is started. Booting a different operating system does not impact the use of a hardware or BIOS based keylogger. </p> <div class="mw-heading mw-heading3"><h3 id="Anti-spyware_/_Anti-virus_programs"><span id="Anti-spyware_.2F_Anti-virus_programs"></span>Anti-spyware / Anti-virus programs</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=13" title="Edit section: Anti-spyware / Anti-virus programs"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Many <a href="/wiki/Anti-spyware" class="mw-redirect" title="Anti-spyware">anti-spyware</a> applications can detect some software based keyloggers and quarantine, disable, or remove them. However, because many keylogging programs are legitimate pieces of software under some circumstances, anti-spyware often neglects to label keylogging programs as spyware or a virus. These applications can detect software-based keyloggers based on patterns in <a href="/wiki/Subroutine" class="mw-redirect" title="Subroutine">executable code</a>, <a href="/wiki/Heuristics" class="mw-redirect" title="Heuristics">heuristics</a> and keylogger behaviors (such as the use of <a href="/wiki/Hooking" title="Hooking">hooks</a> and certain <a href="/wiki/Application_programming_interface" class="mw-redirect" title="Application programming interface">APIs</a>). </p><p>No software-based anti-spyware application can be 100% effective against all keyloggers.<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> Software-based anti-spyware cannot defeat non-software keyloggers (for example, hardware keyloggers attached to keyboards will always receive keystrokes before any software-based anti-spyware application). </p><p>The particular technique that the anti-spyware application uses will influence its potential effectiveness against software keyloggers. As a general rule, anti-spyware applications with <a href="/wiki/Ring_(computer_security)" class="mw-redirect" title="Ring (computer security)">higher privileges</a> will defeat keyloggers with lower privileges. For example, a hook-based anti-spyware application cannot defeat a kernel-based keylogger (as the keylogger will receive the keystroke messages before the anti-spyware application), but it could potentially defeat hook- and API-based keyloggers. </p> <div class="mw-heading mw-heading3"><h3 id="Network_monitors">Network monitors</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=14" title="Edit section: Network monitors"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Network_monitoring" title="Network monitoring">Network monitors</a> (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the user the chance to prevent the keylogger from "<a href="/wiki/Phoning_home" title="Phoning home">phoning home</a>" with their typed information. </p> <div class="mw-heading mw-heading3"><h3 id="Automatic_form_filler_programs">Automatic form filler programs</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=15" title="Edit section: Automatic form filler programs"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Form_filler" title="Form filler">Form filler</a></div> <p>Automatic form-filling programs may prevent keylogging by removing the requirement for a user to type personal details and passwords using the keyboard. <a href="/wiki/Form_filler" title="Form filler">Form fillers</a> are primarily designed for <a href="/wiki/Web_browser" title="Web browser">Web browsers</a> to fill in checkout pages and log users into their accounts. Once the user's account and <a href="/wiki/Credit_card" title="Credit card">credit card</a> information has been entered into the program, it will be automatically entered into forms without ever using the keyboard or <a href="/wiki/Clipboard_(software)" class="mw-redirect" title="Clipboard (software)">clipboard</a>, thereby reducing the possibility that private data is being recorded. However, someone with physical access to the machine may still be able to install software that can intercept this information elsewhere in the operating system or while in transit on the network. (<a href="/wiki/Transport_Layer_Security" title="Transport Layer Security">Transport Layer Security</a> (TLS) reduces the risk that data in transit may be intercepted by <a href="/wiki/Packet_analyzer" title="Packet analyzer">network sniffers</a> and <a href="/wiki/Proxy_server" title="Proxy server">proxy tools</a>.) </p> <div class="mw-heading mw-heading3"><h3 id="One-time_passwords_(OTP)"><span id="One-time_passwords_.28OTP.29"></span>One-time passwords (OTP)</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=16" title="Edit section: One-time passwords (OTP)"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Using <a href="/wiki/One-time_password" title="One-time password">one-time passwords</a> may prevent unauthorized access to an account which has had its login details exposed to an attacker via a keylogger, as each password is invalidated as soon as it is used. This solution may be useful for someone using a public computer. However, an attacker who has remote control over such a computer can simply wait for the victim to enter their credentials before performing unauthorized transactions on their behalf while their session is active. </p><p>Another common way to protect access codes from being stolen by keystroke loggers is by asking users to provide a few randomly selected characters from their authentication code. For example, they might be asked to enter the 2nd, 5th, and 8th characters. Even if someone is watching the user or using a keystroke logger, they would only get a few characters from the code without knowing their positions.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Security_tokens">Security tokens</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=17" title="Edit section: Security tokens"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Use of <a href="/wiki/Smart_card" title="Smart card">smart cards</a> or other <a href="/wiki/Security_token" title="Security token">security tokens</a> may improve security against <a href="/wiki/Replay_attack" title="Replay attack">replay attacks</a> in the face of a successful keylogging attack, as accessing protected information would require both the (hardware) security token as well as the appropriate password/passphrase. Knowing the keystrokes, mouse actions, display, clipboard, etc. used on one computer will not subsequently help an attacker gain access to the protected resource. Some security tokens work as a type of hardware-assisted one-time password system, and others implement a cryptographic <a href="/wiki/Challenge%E2%80%93response_authentication" title="Challenge–response authentication">challenge–response authentication</a>, which can improve security in a manner conceptually similar to one time passwords. <a href="/wiki/Card_reader" title="Card reader">Smartcard readers</a> and their associated keypads for <a href="/wiki/Personal_identification_number" title="Personal identification number">PIN</a> entry may be vulnerable to keystroke logging through a so-called <a href="/wiki/Supply_chain_attack" title="Supply chain attack">supply chain attack</a><sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> where an attacker substitutes the card reader/PIN entry hardware for one which records the user's PIN. </p> <div class="mw-heading mw-heading3"><h3 id="On-screen_keyboards">On-screen keyboards</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=18" title="Edit section: On-screen keyboards"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Most on-screen keyboards (such as the on-screen keyboard that comes with <a href="/wiki/Windows_XP" title="Windows XP">Windows XP</a>) send normal keyboard event messages to the external target program to type text. Software key loggers can log these typed characters sent from one program to another.<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Keystroke_interference_software">Keystroke interference software</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=19" title="Edit section: Keystroke interference software"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Keystroke interference software is also available.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> These programs attempt to trick keyloggers by introducing random keystrokes, although this simply results in the keylogger recording more information than it needs to. An attacker has the task of extracting the keystrokes of interest—the security of this mechanism, specifically how well it stands up to <a href="/wiki/Cryptanalysis" title="Cryptanalysis">cryptanalysis</a>, is unclear. </p> <div class="mw-heading mw-heading3"><h3 id="Speech_recognition">Speech recognition</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=20" title="Edit section: Speech recognition"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Similar to on-screen keyboards, <a href="/wiki/Speech_recognition" title="Speech recognition">speech-to-text conversion</a> software can also be used against keyloggers, since there are no typing or mouse movements involved. The weakest point of using voice-recognition software may be how the software sends the recognized text to target software after the user's speech has been processed. </p> <div class="mw-heading mw-heading3"><h3 id="Handwriting_recognition_and_mouse_gestures">Handwriting recognition and mouse gestures</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=21" title="Edit section: Handwriting recognition and mouse gestures"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Many <a href="/wiki/Personal_digital_assistant" title="Personal digital assistant">PDAs</a> and lately <a href="/wiki/Tablet_computer" title="Tablet computer">tablet PCs</a> can already convert pen (also called stylus) movements on their <a href="/wiki/Touchscreen" title="Touchscreen">touchscreens</a> to computer understandable text successfully. <a href="/wiki/Mouse_gestures" class="mw-redirect" title="Mouse gestures">Mouse gestures</a> use this principle by using mouse movements instead of a stylus. Mouse gesture programs convert these strokes to user-definable actions, such as typing text. Similarly, <a href="/wiki/Graphics_tablet" title="Graphics tablet">graphics tablets</a> and <a href="/wiki/Light_pen" title="Light pen">light pens</a> can be used to input these gestures, however, these are becoming less common.<sup class="noprint Inline-Template" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Manual_of_Style/Words_to_watch#Relative_time_references" title="Wikipedia:Manual of Style/Words to watch"><span title="Clarify the applicable timeframe so that it is unambiguous when read at a later date. (January 2021)">timeframe?</span></a></i>&#93;</sup> </p><p>The same potential weakness of speech recognition applies to this technique as well. </p> <div class="mw-heading mw-heading3"><h3 id="Macro_expanders/recorders"><span id="Macro_expanders.2Frecorders"></span>Macro expanders/recorders</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=22" title="Edit section: Macro expanders/recorders"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>With the help of many programs, a seemingly meaningless text can be expanded to a meaningful text and most of the time context-sensitively, e.g. "en.wikipedia.org" can be expanded when a web browser window has the focus. The biggest weakness of this technique is that these programs send their keystrokes directly to the target program. However, this can be overcome by using <a href="#_Nontechnological_methods">the 'alternating' technique described below</a>, i.e. sending mouse clicks to non-responsive areas of the target program, sending meaningless keys, sending another mouse click to the target area (e.g. password field) and switching back-and-forth. </p> <div class="mw-heading mw-heading3"><h3 id="Deceptive_typing">Deceptive typing</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=23" title="Edit section: Deceptive typing"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Alternating between typing the login credentials and typing characters somewhere else in the focus window<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> can cause a keylogger to record more information than it needs to, but this could be easily filtered out by an attacker. Similarly, a user can move their cursor using the mouse while typing, causing the logged keystrokes to be in the wrong order e.g., by typing a password beginning with the last letter and then using the mouse to move the cursor for each subsequent letter. Lastly, someone can also use <a href="/wiki/Context_menu" title="Context menu">context menus</a> to remove, <a href="/wiki/Cut,_copy,_and_paste" title="Cut, copy, and paste">cut, copy, and paste</a> parts of the typed text without using the keyboard. An attacker who can capture only parts of a password will have a larger <a href="/wiki/Key_space_(cryptography)" class="mw-redirect" title="Key space (cryptography)">key space</a> to attack if they choose to execute a <a href="/wiki/Brute-force_attack" title="Brute-force attack">brute-force attack</a>. </p><p>Another very similar technique uses the fact that any selected text portion is replaced by the next key typed. e.g., if the password is "secret", one could type "s", then some dummy keys "asdf". These dummy characters could then be selected with the mouse, and the next character from the password "e" typed, which replaces the dummy characters "asdf". </p><p>These techniques assume incorrectly that keystroke logging software cannot directly monitor the clipboard, the selected text in a form, or take a screenshot every time a keystroke or mouse click occurs. They may, however, be effective against some hardware keyloggers. </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=24" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col"> <ul><li><a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></li> <li><a href="/wiki/Black-bag_cryptanalysis" title="Black-bag cryptanalysis">Black-bag cryptanalysis</a></li> <li><a href="/wiki/Computer_surveillance" class="mw-redirect" title="Computer surveillance">Computer surveillance</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a></li> <li><a href="/wiki/Digital_footprint" title="Digital footprint">Digital footprint</a></li> <li><a href="/wiki/Hardware_keylogger" title="Hardware keylogger">Hardware keylogger</a></li> <li><a href="/wiki/Reverse_connection" title="Reverse connection">Reverse connection</a></li> <li><a href="/wiki/Session_replay" title="Session replay">Session replay</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Virtual_keyboard" title="Virtual keyboard">Virtual keyboard</a></li> <li><a href="/wiki/Web_tracking" title="Web tracking">Web tracking</a></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=25" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist"> <div class="mw-references-wrap mw-references-columns"><ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite id="CITEREFNyangMohaisenKang2014" class="citation journal cs1">Nyang, DaeHun; Mohaisen, Aziz; Kang, Jeonil (2014-11-01). <a rel="nofollow" class="external text" href="https://ieeexplore.ieee.org/document/6746187">"Keylogging-Resistant Visual Authentication Protocols"</a>. <i>IEEE Transactions on Mobile Computing</i>. <b>13</b> (11): 2566–2579. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FTMC.2014.2307331">10.1109/TMC.2014.2307331</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1536-1233">1536-1233</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:8161528">8161528</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IEEE+Transactions+on+Mobile+Computing&amp;rft.atitle=Keylogging-Resistant+Visual+Authentication+Protocols&amp;rft.volume=13&amp;rft.issue=11&amp;rft.pages=2566-2579&amp;rft.date=2014-11-01&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A8161528%23id-name%3DS2CID&amp;rft.issn=1536-1233&amp;rft_id=info%3Adoi%2F10.1109%2FTMC.2014.2307331&amp;rft.aulast=Nyang&amp;rft.aufirst=DaeHun&amp;rft.au=Mohaisen%2C+Aziz&amp;rft.au=Kang%2C+Jeonil&amp;rft_id=https%3A%2F%2Fieeexplore.ieee.org%2Fdocument%2F6746187&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFConijnCookvan_ZaanenVan_Waes2021" class="citation journal cs1">Conijn, Rianne; Cook, Christine; van Zaanen, Menno; Van Waes, Luuk (2021-08-24). <a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs40593-021-00268-w">"Early prediction of writing quality using keystroke logging"</a>. <i>International Journal of Artificial Intelligence in Education</i>. <b>32</b> (4): 835–866. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs40593-021-00268-w">10.1007/s40593-021-00268-w</a></span>. <a href="/wiki/Hdl_(identifier)" class="mw-redirect" title="Hdl (identifier)">hdl</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://hdl.handle.net/10067%2F1801420151162165141">10067/1801420151162165141</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1560-4292">1560-4292</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:238703970">238703970</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Artificial+Intelligence+in+Education&amp;rft.atitle=Early+prediction+of+writing+quality+using+keystroke+logging&amp;rft.volume=32&amp;rft.issue=4&amp;rft.pages=835-866&amp;rft.date=2021-08-24&amp;rft_id=info%3Ahdl%2F10067%2F1801420151162165141&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A238703970%23id-name%3DS2CID&amp;rft.issn=1560-4292&amp;rft_id=info%3Adoi%2F10.1007%2Fs40593-021-00268-w&amp;rft.aulast=Conijn&amp;rft.aufirst=Rianne&amp;rft.au=Cook%2C+Christine&amp;rft.au=van+Zaanen%2C+Menno&amp;rft.au=Van+Waes%2C+Luuk&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1007%252Fs40593-021-00268-w&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.keylogger.org/keylogger.html#h_8">Use of legal software products for computer monitoring</a>, keylogger.org</span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130911175015/http://oxforddictionaries.com/definition/english/keylogger">"Keylogger"</a>. Oxford dictionaries. Archived from <a rel="nofollow" class="external text" href="http://oxforddictionaries.com/definition/english/keylogger">the original</a> on 2013-09-11<span class="reference-accessdate">. Retrieved <span class="nowrap">2013-08-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Keylogger&amp;rft.pub=Oxford+dictionaries&amp;rft_id=http%3A%2F%2Foxforddictionaries.com%2Fdefinition%2Fenglish%2Fkeylogger&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-1/36138/">Keyloggers: How they work and how to detect them (Part 1)</a>, <i>Secure List</i>, "Today, keyloggers are mainly used to steal user data relating to various online payment systems, and virus writers are constantly writing new keylogger Trojans for this very purpose."</span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRaiChoubeySuryanshGarg2022" class="citation book cs1">Rai, Swarnima; Choubey, Vaaruni; Suryansh; Garg, Puneet (2022-07-08). <a rel="nofollow" class="external text" href="https://ieeexplore.ieee.org/document/9913618">"A Systematic Review of Encryption and Keylogging for Computer System Security"</a>. <i>2022 Fifth International Conference on Computational Intelligence and Communication Technologies (CCICT)</i>. IEEE. pp.&#160;157–163. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FCCiCT56684.2022.00039">10.1109/CCiCT56684.2022.00039</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-6654-7224-1" title="Special:BookSources/978-1-6654-7224-1"><bdi>978-1-6654-7224-1</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:252849669">252849669</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=A+Systematic+Review+of+Encryption+and+Keylogging+for+Computer+System+Security&amp;rft.btitle=2022+Fifth+International+Conference+on+Computational+Intelligence+and+Communication+Technologies+%28CCICT%29&amp;rft.pages=157-163&amp;rft.pub=IEEE&amp;rft.date=2022-07-08&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A252849669%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FCCiCT56684.2022.00039&amp;rft.isbn=978-1-6654-7224-1&amp;rft.aulast=Rai&amp;rft.aufirst=Swarnima&amp;rft.au=Choubey%2C+Vaaruni&amp;rft.au=Suryansh&amp;rft.au=Garg%2C+Puneet&amp;rft_id=https%3A%2F%2Fieeexplore.ieee.org%2Fdocument%2F9913618&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text">Stefan, Deian, Xiaokui Shu, and Danfeng Daphne Yao. "<a rel="nofollow" class="external text" href="http://cseweb.ucsd.edu/~dstefan/pubs/stefan:2011:robust.pdf">Robustness of keystroke-dynamics based biometrics against synthetic forgeries</a>." computers &amp; security 31.1 (2012): 109-121.</span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.cryptomuseum.com/covert/bugs/selectric/index.htm">"Selectric bug"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Selectric+bug&amp;rft_id=http%3A%2F%2Fwww.cryptomuseum.com%2Fcovert%2Fbugs%2Fselectric%2Findex.htm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-9">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://securitydigest.org/unix/archive/006">"The Security Digest Archives"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-11-22</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Security+Digest+Archives&amp;rft_id=http%3A%2F%2Fsecuritydigest.org%2Funix%2Farchive%2F006&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20131220110339/http://www.qccglobal.com/news/first-keystroke-logger.php">"Soviet Spies Bugged World's First Electronic Typewriters"</a>. <i>qccglobal.com</i>. Archived from <a rel="nofollow" class="external text" href="http://www.qccglobal.com/news/first-keystroke-logger.php">the original</a> on 2013-12-20<span class="reference-accessdate">. Retrieved <span class="nowrap">2013-12-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=qccglobal.com&amp;rft.atitle=Soviet+Spies+Bugged+World%27s+First+Electronic+Typewriters&amp;rft_id=http%3A%2F%2Fwww.qccglobal.com%2Fnews%2Ffirst-keystroke-logger.php&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-ingersoll-11"><span class="mw-cite-backlink">^ <a href="#cite_ref-ingersoll_11-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-ingersoll_11-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"> Geoffrey Ingersoll. <a rel="nofollow" class="external text" href="http://www.businessinsider.com/russia-turns-to-typewriters-for-secrets-2013-7">"Russia Turns To Typewriters To Protect Against Cyber Espionage"</a>. 2013.</span> </li> <li id="cite_note-gunman-12"><span class="mw-cite-backlink">^ <a href="#cite_ref-gunman_12-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-gunman_12-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text">Sharon A. Maneki. <a rel="nofollow" class="external text" href="http://www.nsa.gov/about/_files/cryptologic_heritage/center_crypt_history/publications/learning_from_the_enemy_the_gunman_project.pdf">"Learning from the Enemy: The GUNMAN Project"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171203032854/https://www.nsa.gov/about/_files/cryptologic_heritage/center_crypt_history/publications/learning_from_the_enemy_the_gunman_project.pdf">Archived</a> 2017-12-03 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>. 2012.</span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAgence_France-Presse,_Associated_Press2013" class="citation web cs1">Agence France-Presse, Associated Press (13 July 2013). <a rel="nofollow" class="external text" href="http://technology.inquirer.net/27149/wanted-20-electric-typewriters-for-russia-to-avoid-leaks">"Wanted: 20 electric typewriters for Russia to avoid leaks"</a>. <i>inquirer.net</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=inquirer.net&amp;rft.atitle=Wanted%3A+20+electric+typewriters+for+Russia+to+avoid+leaks&amp;rft.date=2013-07-13&amp;rft.au=Agence+France-Presse%2C+Associated+Press&amp;rft_id=http%3A%2F%2Ftechnology.inquirer.net%2F27149%2Fwanted-20-electric-typewriters-for-russia-to-avoid-leaks&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"> Anna Arutunyan. <a rel="nofollow" class="external text" href="http://themoscownews.com/russia/20130711/191758523/Russian-security-agency-to-buy-typewriters-to-avoid-surveillance.html">"Russian security agency to buy typewriters to avoid surveillance"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131221071647/http://themoscownews.com/russia/20130711/191758523/Russian-security-agency-to-buy-typewriters-to-avoid-surveillance.html">Archived</a> 2013-12-21 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>.</span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.pctools.com/security-news/what-is-a-keylogger/">"What is a Keylogger?"</a>. PC Tools.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=What+is+a+Keylogger%3F&amp;rft.pub=PC+Tools&amp;rft_id=http%3A%2F%2Fwww.pctools.com%2Fsecurity-news%2Fwhat-is-a-keylogger%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCaleb_Chen2017" class="citation web cs1">Caleb Chen (2017-03-20). <a rel="nofollow" class="external text" href="https://www.privateinternetaccess.com/blog/2017/03/microsoft-windows-10-keylogger-enabled-default-heres-disable/">"Microsoft Windows 10 has a keylogger enabled by default – here's how to disable it"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Microsoft+Windows+10+has+a+keylogger+enabled+by+default+%E2%80%93+here%27s+how+to+disable+it&amp;rft.date=2017-03-20&amp;rft.au=Caleb+Chen&amp;rft_id=https%3A%2F%2Fwww.privateinternetaccess.com%2Fblog%2F2017%2F03%2Fmicrosoft-windows-10-keylogger-enabled-default-heres-disable%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20060315074124/http://www.symantec.com/avcenter/reference/the.evolution.of.malicious.irc.bots.pdf">"The Evolution of Malicious IRC Bots"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/NortonLifeLock" class="mw-redirect" title="NortonLifeLock">Symantec</a>. 2005-11-26. pp.&#160;23–24. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/avcenter/reference/the.evolution.of.malicious.irc.bots.pdf">the original</a> <span class="cs1-format">(PDF)</span> on March 15, 2006<span class="reference-accessdate">. Retrieved <span class="nowrap">2011-03-25</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Evolution+of+Malicious+IRC+Bots&amp;rft.pages=23-24&amp;rft.pub=Symantec&amp;rft.date=2005-11-26&amp;rft_id=http%3A%2F%2Fwww.symantec.com%2Favcenter%2Freference%2Fthe.evolution.of.malicious.irc.bots.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJonathan_Brossard2008" class="citation web cs1">Jonathan Brossard (2008-09-03). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20080913072014/http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf">"Bypassing pre-boot authentication passwords by instrumenting the BIOS keyboard buffer (practical low level attacks against x86 pre-boot authentication software)"</a> <span class="cs1-format">(PDF)</span>. <i><a href="/wiki/IViz_Security" title="IViz Security">iViz Security</a></i>. Archived from <a rel="nofollow" class="external text" href="http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2008-09-13<span class="reference-accessdate">. Retrieved <span class="nowrap">2008-09-23</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=iViz+Security&amp;rft.atitle=Bypassing+pre-boot+authentication+passwords+by+instrumenting+the+BIOS+keyboard+buffer+%28practical+low+level+attacks+against+x86+pre-boot+authentication+software%29&amp;rft.date=2008-09-03&amp;rft.au=Jonathan+Brossard&amp;rft_id=http%3A%2F%2Fwww.ivizsecurity.com%2Fresearch%2Fpreboot%2Fpreboot_whitepaper.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://threatpost.com/web-based-keylogger-used-to-steal-credit-card-data-from-popular-sites/121141/">"Web-Based Keylogger Used to Steal Credit Card Data from Popular Sites"</a>. <i>Threatpost | The first stop for security news</i>. 2016-10-06<span class="reference-accessdate">. Retrieved <span class="nowrap">2017-01-24</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Threatpost+%7C+The+first+stop+for+security+news&amp;rft.atitle=Web-Based+Keylogger+Used+to+Steal+Credit+Card+Data+from+Popular+Sites&amp;rft.date=2016-10-06&amp;rft_id=https%3A%2F%2Fthreatpost.com%2Fweb-based-keylogger-used-to-steal-credit-card-data-from-popular-sites%2F121141%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://krebsonsecurity.com/2011/04/spyeye-targets-opera-google-chrome-users/">"SpyEye Targets Opera, Google Chrome Users"</a>. <i>Krebs on Security</i><span class="reference-accessdate">. Retrieved <span class="nowrap">26 April</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Krebs+on+Security&amp;rft.atitle=SpyEye+Targets+Opera%2C+Google+Chrome+Users&amp;rft_id=https%3A%2F%2Fkrebsonsecurity.com%2F2011%2F04%2Fspyeye-targets-opera-google-chrome-users%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text">K.P.H. Sullivan &amp; E. Lindgren (Eds., 2006), Studies in Writing: Vol. 18. Computer Key-Stroke Logging and Writing: Methods and Applications. Oxford: Elsevier.</span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text">V. W. Berninger (Ed., 2012), Past, present, and future contributions of cognitive writing research to cognitive psychology. New York/Sussex: Taylor &amp; Francis. <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781848729636" title="Special:BookSources/9781848729636">9781848729636</a></span> </li> <li id="cite_note-AAA-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-AAA_23-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFVincentas2013" class="citation news cs1">Vincentas (11 July 2013). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131207133350/http://www.spywareloop.com/news/keystroke-logging">"Keystroke Logging in SpyWareLoop.com"</a>. <i>Spyware Loop</i>. Archived from <a rel="nofollow" class="external text" href="http://www.spywareloop.com/news/keystroke-logging">the original</a> on 7 December 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">27 July</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Spyware+Loop&amp;rft.atitle=Keystroke+Logging+in+SpyWareLoop.com&amp;rft.date=2013-07-11&amp;rft.au=Vincentas&amp;rft_id=http%3A%2F%2Fwww.spywareloop.com%2Fnews%2Fkeystroke-logging&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMicrosoft" class="citation web cs1">Microsoft. <a rel="nofollow" class="external text" href="http://msdn.microsoft.com/en-us/library/bb761584(VS.85).aspx">"EM_GETLINE Message()"</a>. <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-07-15</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=EM_GETLINE+Message%28%29&amp;rft.pub=Microsoft&amp;rft.au=Microsoft&amp;rft_id=http%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fbb761584%28VS.85%29.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20090826150015/http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed">"Apple keyboard hack"</a>. Digital Society. Archived from <a rel="nofollow" class="external text" href="http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed/">the original</a> on 26 August 2009<span class="reference-accessdate">. Retrieved <span class="nowrap">9 June</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Apple+keyboard+hack&amp;rft.pub=Digital+Society&amp;rft_id=http%3A%2F%2Fwww.digitalsociety.org%2F2009%2F08%2Fapple-keyboards-hacked-and-possessed%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20110429181147/http://spyreveal.com/keyloggerremoval">"Keylogger Removal"</a>. SpyReveal Anti Keylogger. Archived from <a rel="nofollow" class="external text" href="http://spyreveal.com/keyloggerremoval">the original</a> on 29 April 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">25 April</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Keylogger+Removal&amp;rft.pub=SpyReveal+Anti+Keylogger&amp;rft_id=http%3A%2F%2Fspyreveal.com%2Fkeyloggerremoval&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.bastille.net/technical-details">"Keylogger Removal"</a>. SpyReveal Anti Keylogger<span class="reference-accessdate">. Retrieved <span class="nowrap">26 February</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Keylogger+Removal&amp;rft.pub=SpyReveal+Anti+Keylogger&amp;rft_id=https%3A%2F%2Fwww.bastille.net%2Ftechnical-details&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJeremy_Kirk2008" class="citation news cs1">Jeremy Kirk (2008-12-16). <a rel="nofollow" class="external text" href="http://www.pcworld.com/article/155525/.html?tk=rss_news">"Tampered Credit Card Terminals"</a>. <a href="/wiki/International_Data_Group" title="International Data Group">IDG</a> News Service<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-04-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=Tampered+Credit+Card+Terminals&amp;rft.date=2008-12-16&amp;rft.au=Jeremy+Kirk&amp;rft_id=http%3A%2F%2Fwww.pcworld.com%2Farticle%2F155525%2F.html%3Ftk%3Drss_news&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAndrew_Kelly2010" class="citation web cs1">Andrew Kelly (2010-09-10). <a rel="nofollow" class="external text" href="http://www.inf.ed.ac.uk/publications/thesis/online/IM100855.pdf">"Cracking Passwords using Keyboard Acoustics and Language Modeling"</a> <span class="cs1-format">(PDF)</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Cracking+Passwords+using+Keyboard+Acoustics+and+Language+Modeling&amp;rft.date=2010-09-10&amp;rft.au=Andrew+Kelly&amp;rft_id=http%3A%2F%2Fwww.inf.ed.ac.uk%2Fpublications%2Fthesis%2Fonline%2FIM100855.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSarah_Young2005" class="citation web cs1">Sarah Young (14 September 2005). <a rel="nofollow" class="external text" href="http://www.berkeley.edu/news/media/releases/2005/09/14_key.shtml">"Researchers recover typed text using audio recording of keystrokes"</a>. UC Berkeley NewsCenter.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Researchers+recover+typed+text+using+audio+recording+of+keystrokes&amp;rft.pub=UC+Berkeley+NewsCenter&amp;rft.date=2005-09-14&amp;rft.au=Sarah+Young&amp;rft_id=http%3A%2F%2Fwww.berkeley.edu%2Fnews%2Fmedia%2Freleases%2F2005%2F09%2F14_key.shtml&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKnight" class="citation web cs1">Knight, Will. <a rel="nofollow" class="external text" href="https://www.zdnet.com/article/a-year-ago-cypherpunks-publish-proof-of-tempest/">"A Year Ago: Cypherpunks publish proof of Tempest"</a>. <i>ZDNet</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=ZDNet&amp;rft.atitle=A+Year+Ago%3A+Cypherpunks+publish+proof+of+Tempest&amp;rft.aulast=Knight&amp;rft.aufirst=Will&amp;rft_id=https%3A%2F%2Fwww.zdnet.com%2Farticle%2Fa-year-ago-cypherpunks-publish-proof-of-tempest%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-32"><span class="mw-cite-backlink"><b><a href="#cite_ref-32">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMartin_Vuagnoux_and_Sylvain_Pasini2009" class="citation journal cs1">Martin Vuagnoux and Sylvain Pasini (2009-06-01). Vuagnoux, Martin; Pasini, Sylvain (eds.). <a rel="nofollow" class="external text" href="http://infoscience.epfl.ch/record/140523?ln=en">"Compromising Electromagnetic Emanations of Wired and Wireless Keyboards"</a>. <i>Proceedings of the 18th Usenix Security Symposium</i>: 1–16.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Proceedings+of+the+18th+Usenix+Security+Symposium&amp;rft.atitle=Compromising+Electromagnetic+Emanations+of+Wired+and+Wireless+Keyboards&amp;rft.pages=1-16&amp;rft.date=2009-06-01&amp;rft.au=Martin+Vuagnoux+and+Sylvain+Pasini&amp;rft_id=http%3A%2F%2Finfoscience.epfl.ch%2Frecord%2F140523%3Fln%3Den&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.snopes.com/fraud/atm/atmcamera.asp">"ATM camera"</a>. <i>www.snopes.com</i>. 19 January 2004<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-04-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=www.snopes.com&amp;rft.atitle=ATM+camera&amp;rft.date=2004-01-19&amp;rft_id=http%3A%2F%2Fwww.snopes.com%2Ffraud%2Fatm%2Fatmcamera.asp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-34">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMaggiVolpattoGaspariniBoracchi2011" class="citation conference cs1">Maggi, Federico; Volpatto, Alberto; Gasparini, Simone; Boracchi, Giacomo; Zanero, Stefano (2011). <a rel="nofollow" class="external text" href="http://www.syssec-project.eu/m/page-media/3/iclearshot-ias11.pdf">"A fast eavesdropping attack against touchscreens"</a> <span class="cs1-format">(PDF)</span>. <i>2011 7th International Conference on Information Assurance and Security (IAS)</i>. 7th International Conference on Information Assurance and Security. IEEE. pp.&#160;320–325. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FISIAS.2011.6122840">10.1109/ISIAS.2011.6122840</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4577-2155-7" title="Special:BookSources/978-1-4577-2155-7"><bdi>978-1-4577-2155-7</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.atitle=A+fast+eavesdropping+attack+against+touchscreens&amp;rft.btitle=2011+7th+International+Conference+on+Information+Assurance+and+Security+%28IAS%29&amp;rft.pages=320-325&amp;rft.pub=IEEE&amp;rft.date=2011&amp;rft_id=info%3Adoi%2F10.1109%2FISIAS.2011.6122840&amp;rft.isbn=978-1-4577-2155-7&amp;rft.aulast=Maggi&amp;rft.aufirst=Federico&amp;rft.au=Volpatto%2C+Alberto&amp;rft.au=Gasparini%2C+Simone&amp;rft.au=Boracchi%2C+Giacomo&amp;rft.au=Zanero%2C+Stefano&amp;rft_id=http%3A%2F%2Fwww.syssec-project.eu%2Fm%2Fpage-media%2F3%2Ficlearshot-ias11.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMarquardtVermaCarterTraynor2011" class="citation conference cs1">Marquardt, Philip; Verma, Arunabh; Carter, Henry; Traynor, Patrick (2011). <i>(sp)iPhone: decoding vibrations from nearby keyboards using mobile phone accelerometers</i>. Proceedings of the 18th ACM conference on Computer and communications security. ACM. pp.&#160;561–562. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2046707.2046771">10.1145/2046707.2046771</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=%28sp%29iPhone%3A+decoding+vibrations+from+nearby+keyboards+using+mobile+phone+accelerometers&amp;rft.pages=561-562&amp;rft.pub=ACM&amp;rft.date=2011&amp;rft_id=info%3Adoi%2F10.1145%2F2046707.2046771&amp;rft.aulast=Marquardt&amp;rft.aufirst=Philip&amp;rft.au=Verma%2C+Arunabh&amp;rft.au=Carter%2C+Henry&amp;rft.au=Traynor%2C+Patrick&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation magazine cs1"><a rel="nofollow" class="external text" href="https://www.wired.com/2011/10/iphone-keylogger-spying/">"iPhone Accelerometer Could Spy on Computer Keystrokes"</a>. <i>Wired</i>. 19 October 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">August 25,</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Wired&amp;rft.atitle=iPhone+Accelerometer+Could+Spy+on+Computer+Keystrokes&amp;rft.date=2011-10-19&amp;rft_id=https%3A%2F%2Fwww.wired.com%2F2011%2F10%2Fiphone-keylogger-spying%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOwusuHanDasPerrig2012" class="citation conference cs1">Owusu, Emmanuel; Han, Jun; Das, Sauvik; Perrig, Adrian; Zhang, Joy (2012). <i>ACCessory: password inference using accelerometers on smartphones</i>. Proceedings of the Thirteenth Workshop on Mobile Computing Systems and Applications. ACM. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2162081.2162095">10.1145/2162081.2162095</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=ACCessory%3A+password+inference+using+accelerometers+on+smartphones&amp;rft.pub=ACM&amp;rft.date=2012&amp;rft_id=info%3Adoi%2F10.1145%2F2162081.2162095&amp;rft.aulast=Owusu&amp;rft.aufirst=Emmanuel&amp;rft.au=Han%2C+Jun&amp;rft.au=Das%2C+Sauvik&amp;rft.au=Perrig%2C+Adrian&amp;rft.au=Zhang%2C+Joy&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAvivSappBlazeSmith2012" class="citation conference cs1">Aviv, Adam J.; Sapp, Benjamin; Blaze, Matt; Smith, Jonathan M. (2012). "Practicality of accelerometer side channels on smartphones". <i>Proceedings of the 28th Annual Computer Security Applications Conference on - ACSAC '12</i>. Proceedings of the 28th Annual Computer Security Applications Conference. ACM. p.&#160;41. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2420950.2420957">10.1145/2420950.2420957</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/9781450313124" title="Special:BookSources/9781450313124"><bdi>9781450313124</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.atitle=Practicality+of+accelerometer+side+channels+on+smartphones&amp;rft.btitle=Proceedings+of+the+28th+Annual+Computer+Security+Applications+Conference+on+-+ACSAC+%2712&amp;rft.pages=41&amp;rft.pub=ACM&amp;rft.date=2012&amp;rft_id=info%3Adoi%2F10.1145%2F2420950.2420957&amp;rft.isbn=9781450313124&amp;rft.aulast=Aviv&amp;rft.aufirst=Adam+J.&amp;rft.au=Sapp%2C+Benjamin&amp;rft.au=Blaze%2C+Matt&amp;rft.au=Smith%2C+Jonathan+M.&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCaiChen2011" class="citation conference cs1">Cai, Liang; Chen, Hao (2011). <a rel="nofollow" class="external text" href="https://www.usenix.org/events/hotsec11/tech/final_files/Cai.pdf"><i>TouchLogger: inferring keystrokes on touch screen from smartphone motion</i></a> <span class="cs1-format">(PDF)</span>. Proceedings of the 6th USENIX conference on Hot topics in security. USENIX<span class="reference-accessdate">. Retrieved <span class="nowrap">25 August</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=TouchLogger%3A+inferring+keystrokes+on+touch+screen+from+smartphone+motion&amp;rft.pub=USENIX&amp;rft.date=2011&amp;rft.aulast=Cai&amp;rft.aufirst=Liang&amp;rft.au=Chen%2C+Hao&amp;rft_id=https%3A%2F%2Fwww.usenix.org%2Fevents%2Fhotsec11%2Ftech%2Ffinal_files%2FCai.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFXuBaiZhu2012" class="citation conference cs1">Xu, Zhi; Bai, Kun; Zhu, Sencun (2012). <i>TapLogger: inferring user inputs on smartphone touchscreens using on-board motion sensors</i>. Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks. ACM. pp.&#160;113–124. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2185448.2185465">10.1145/2185448.2185465</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=TapLogger%3A+inferring+user+inputs+on+smartphone+touchscreens+using+on-board+motion+sensors&amp;rft.pages=113-124&amp;rft.pub=ACM&amp;rft.date=2012&amp;rft_id=info%3Adoi%2F10.1145%2F2185448.2185465&amp;rft.aulast=Xu&amp;rft.aufirst=Zhi&amp;rft.au=Bai%2C+Kun&amp;rft.au=Zhu%2C+Sencun&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMiluzzoVarshavskyBalakrishnanChoudhury2012" class="citation conference cs1">Miluzzo, Emiliano; Varshavsky, Alexander; Balakrishnan, Suhrid; Choudhury, Romit Roy (2012). <i>Tapprints: your finger taps have fingerprints</i>. Proceedings of the 10th international conference on Mobile systems, applications, and services. ACM. pp.&#160;323–336. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2307636.2307666">10.1145/2307636.2307666</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=Tapprints%3A+your+finger+taps+have+fingerprints&amp;rft.pages=323-336&amp;rft.pub=ACM&amp;rft.date=2012&amp;rft_id=info%3Adoi%2F10.1145%2F2307636.2307666&amp;rft.aulast=Miluzzo&amp;rft.aufirst=Emiliano&amp;rft.au=Varshavsky%2C+Alexander&amp;rft.au=Balakrishnan%2C+Suhrid&amp;rft.au=Choudhury%2C+Romit+Roy&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSpreitzer2014" class="citation conference cs1">Spreitzer, Raphael (2014). <i>PIN Skimming: Exploiting the Ambient-Light Sensor in Mobile Devices</i>. Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones &amp; Mobile Devices. ACM. pp.&#160;51–62. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1405.3760">1405.3760</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2666620.2666622">10.1145/2666620.2666622</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=PIN+Skimming%3A+Exploiting+the+Ambient-Light+Sensor+in+Mobile+Devices&amp;rft.pages=51-62&amp;rft.pub=ACM&amp;rft.date=2014&amp;rft_id=info%3Aarxiv%2F1405.3760&amp;rft_id=info%3Adoi%2F10.1145%2F2666620.2666622&amp;rft.aulast=Spreitzer&amp;rft.aufirst=Raphael&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHameiri2019" class="citation journal cs1">Hameiri, Paz (2019). <a rel="nofollow" class="external text" href="https://hakin9.org/product/hacking-with-raspberry-pi-4/">"Body Keylogging"</a>. <i>Hakin9 IT Security Magazine</i>. <b>14</b> (7): 79–94.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Hakin9+IT+Security+Magazine&amp;rft.atitle=Body+Keylogging&amp;rft.volume=14&amp;rft.issue=7&amp;rft.pages=79-94&amp;rft.date=2019&amp;rft.aulast=Hameiri&amp;rft.aufirst=Paz&amp;rft_id=https%3A%2F%2Fhakin9.org%2Fproduct%2Fhacking-with-raspberry-pi-4%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-auto-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-auto_44-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYoungYung1997" class="citation book cs1">Young, Adam; Yung, Moti (1997). "Deniable password snatching: On the possibility of evasive electronic espionage". <i>Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097)</i>. pp.&#160;224–235. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FSECPRI.1997.601339">10.1109/SECPRI.1997.601339</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8186-7828-8" title="Special:BookSources/978-0-8186-7828-8"><bdi>978-0-8186-7828-8</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:14768587">14768587</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Deniable+password+snatching%3A+On+the+possibility+of+evasive+electronic+espionage&amp;rft.btitle=Proceedings.+1997+IEEE+Symposium+on+Security+and+Privacy+%28Cat.+No.97CB36097%29&amp;rft.pages=224-235&amp;rft.date=1997&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A14768587%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FSECPRI.1997.601339&amp;rft.isbn=978-0-8186-7828-8&amp;rft.aulast=Young&amp;rft.aufirst=Adam&amp;rft.au=Yung%2C+Moti&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYoungYung1996" class="citation book cs1">Young, Adam; Yung, Moti (1996). "Cryptovirology: Extortion-based security threats and countermeasures". <i>Proceedings 1996 IEEE Symposium on Security and Privacy</i>. pp.&#160;129–140. <a href="/wiki/CiteSeerX_(identifier)" class="mw-redirect" title="CiteSeerX (identifier)">CiteSeerX</a>&#160;<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.44.9122">10.1.1.44.9122</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FSECPRI.1996.502676">10.1109/SECPRI.1996.502676</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-8186-7417-4" title="Special:BookSources/978-0-8186-7417-4"><bdi>978-0-8186-7417-4</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:12179472">12179472</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Cryptovirology%3A+Extortion-based+security+threats+and+countermeasures&amp;rft.btitle=Proceedings+1996+IEEE+Symposium+on+Security+and+Privacy&amp;rft.pages=129-140&amp;rft.date=1996&amp;rft_id=https%3A%2F%2Fciteseerx.ist.psu.edu%2Fviewdoc%2Fsummary%3Fdoi%3D10.1.1.44.9122%23id-name%3DCiteSeerX&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A12179472%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FSECPRI.1996.502676&amp;rft.isbn=978-0-8186-7417-4&amp;rft.aulast=Young&amp;rft.aufirst=Adam&amp;rft.au=Yung%2C+Moti&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohn_Leyden2000" class="citation web cs1">John Leyden (2000-12-06). <a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2000/12/06/mafia_trial_to_test_fbi/">"Mafia trial to test FBI spying tactics: Keystroke logging used to spy on mob suspect using PGP"</a>. <i>The Register</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-04-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Register&amp;rft.atitle=Mafia+trial+to+test+FBI+spying+tactics%3A+Keystroke+logging+used+to+spy+on+mob+suspect+using+PGP&amp;rft.date=2000-12-06&amp;rft.au=John+Leyden&amp;rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2000%2F12%2F06%2Fmafia_trial_to_test_fbi%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFJohn_Leyden2002" class="citation web cs1">John Leyden (2002-08-16). <a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2002/08/16/russians_accuse_fbi_agent/">"Russians accuse FBI Agent of Hacking"</a>. <i>The Register</i>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Register&amp;rft.atitle=Russians+accuse+FBI+Agent+of+Hacking&amp;rft.date=2002-08-16&amp;rft.au=John+Leyden&amp;rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2002%2F08%2F16%2Frussians_accuse_fbi_agent%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAlex_Stim2015" class="citation web cs1">Alex Stim (2015-10-28). <a rel="nofollow" class="external text" href="http://www.spyrix.com/3-methods-to-disable-windows-10-built-in-spy-keylogger.php">"3 methods to disable Windows 10 built-in Spy Keylogger"</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=3+methods+to+disable+Windows+10+built-in+Spy+Keylogger&amp;rft.date=2015-10-28&amp;rft.au=Alex+Stim&amp;rft_id=http%3A%2F%2Fwww.spyrix.com%2F3-methods-to-disable-windows-10-built-in-spy-keylogger.php&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.securitysupervisor.com/security-q-a/computer-security/218-what-is-anti-keylogger">"What is Anti Keylogger?"</a>. 23 August 2018.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=What+is+Anti+Keylogger%3F&amp;rft.date=2018-08-23&amp;rft_id=http%3A%2F%2Fwww.securitysupervisor.com%2Fsecurity-q-a%2Fcomputer-security%2F218-what-is-anti-keylogger&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCreutzburg2017" class="citation journal cs1">Creutzburg, Reiner (2017-01-29). <a rel="nofollow" class="external text" href="https://www.ingentaconnect.com/content/ist/ei/2017/00002017/00000006/art00019">"The strange world of keyloggers - an overview, Part I"</a>. <i>Electronic Imaging</i>. <b>2017</b> (6): 139–148. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.2352%2FISSN.2470-1173.2017.6.MOBMU-313">10.2352/ISSN.2470-1173.2017.6.MOBMU-313</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Electronic+Imaging&amp;rft.atitle=The+strange+world+of+keyloggers+-+an+overview%2C+Part+I&amp;rft.volume=2017&amp;rft.issue=6&amp;rft.pages=139-148&amp;rft.date=2017-01-29&amp;rft_id=info%3Adoi%2F10.2352%2FISSN.2470-1173.2017.6.MOBMU-313&amp;rft.aulast=Creutzburg&amp;rft.aufirst=Reiner&amp;rft_id=https%3A%2F%2Fwww.ingentaconnect.com%2Fcontent%2Fist%2Fei%2F2017%2F00002017%2F00000006%2Fart00019&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGoringRabaiottiJones2007" class="citation journal cs1">Goring, Stuart P.; Rabaiotti, Joseph R.; Jones, Antonia J. (2007-09-01). <a rel="nofollow" class="external text" href="https://www.sciencedirect.com/science/article/pii/S0167404807000569">"Anti-keylogging measures for secure Internet login: An example of the law of unintended consequences"</a>. <i>Computers &amp; Security</i>. <b>26</b> (6): 421–426. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.cose.2007.05.003">10.1016/j.cose.2007.05.003</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0167-4048">0167-4048</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=Anti-keylogging+measures+for+secure+Internet+login%3A+An+example+of+the+law+of+unintended+consequences&amp;rft.volume=26&amp;rft.issue=6&amp;rft.pages=421-426&amp;rft.date=2007-09-01&amp;rft_id=info%3Adoi%2F10.1016%2Fj.cose.2007.05.003&amp;rft.issn=0167-4048&amp;rft.aulast=Goring&amp;rft.aufirst=Stuart+P.&amp;rft.au=Rabaiotti%2C+Joseph+R.&amp;rft.au=Jones%2C+Antonia+J.&amp;rft_id=https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS0167404807000569&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAustin_Modine2008" class="citation web cs1">Austin Modine (2008-10-10). <a rel="nofollow" class="external text" href="https://www.theregister.co.uk/2008/10/10/organized_crime_doctors_chip_and_pin_machines/">"Organized crime tampers with European card swipe devices"</a>. <i>The Register</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2009-04-18</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Register&amp;rft.atitle=Organized+crime+tampers+with+European+card+swipe+devices&amp;rft.date=2008-10-10&amp;rft.au=Austin+Modine&amp;rft_id=https%3A%2F%2Fwww.theregister.co.uk%2F2008%2F10%2F10%2Forganized_crime_doctors_chip_and_pin_machines%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFScott_Dunn2009" class="citation web cs1">Scott Dunn (2009-09-10). <a rel="nofollow" class="external text" href="http://windowssecrets.com/top-story/prevent-keyloggers-from-grabbing-your-passwords/">"Prevent keyloggers from grabbing your passwords"</a>. Windows Secrets<span class="reference-accessdate">. Retrieved <span class="nowrap">2014-05-10</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Prevent+keyloggers+from+grabbing+your+passwords&amp;rft.pub=Windows+Secrets&amp;rft.date=2009-09-10&amp;rft.au=Scott+Dunn&amp;rft_id=http%3A%2F%2Fwindowssecrets.com%2Ftop-story%2Fprevent-keyloggers-from-grabbing-your-passwords%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFChristopher_Ciabarra2009" class="citation web cs1">Christopher Ciabarra (2009-06-10). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20100626093658/http://networkintercept.com/keystrokeinterference.html">"Anti Keylogger"</a>. Networkintercept.com. Archived from <a rel="nofollow" class="external text" href="http://networkintercept.com/keystrokeinterference.html">the original</a> on 2010-06-26.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Anti+Keylogger&amp;rft.pub=Networkintercept.com&amp;rft.date=2009-06-10&amp;rft.au=Christopher+Ciabarra&amp;rft_id=http%3A%2F%2Fnetworkintercept.com%2Fkeystrokeinterference.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCormac_Herley_and_Dinei_Florencio2006" class="citation web cs1">Cormac Herley and Dinei Florencio (2006-02-06). <a rel="nofollow" class="external text" href="http://cups.cs.cmu.edu/soups/2006/posters/herley-poster_abstract.pdf">"How To Login From an Internet Cafe Without Worrying About Keyloggers"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Microsoft_Research" title="Microsoft Research">Microsoft Research</a><span class="reference-accessdate">. Retrieved <span class="nowrap">2008-09-23</span></span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=How+To+Login+From+an+Internet+Cafe+Without+Worrying+About+Keyloggers&amp;rft.pub=Microsoft+Research&amp;rft.date=2006-02-06&amp;rft.au=Cormac+Herley+and+Dinei+Florencio&amp;rft_id=http%3A%2F%2Fcups.cs.cmu.edu%2Fsoups%2F2006%2Fposters%2Fherley-poster_abstract.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AKeystroke+logging" class="Z3988"></span></span> </li> </ol></div></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Keystroke_logging&amp;action=edit&amp;section=26" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><span class="noviewer" typeof="mw:File"><a href="/wiki/File:Commons-logo.svg" class="mw-file-description"><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/12px-Commons-logo.svg.png" decoding="async" width="12" height="16" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/18px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/24px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></a></span> Media related to <a href="https://commons.wikimedia.org/wiki/Category:Keystroke_logging" class="extiw" title="commons:Category:Keystroke logging">Keystroke logging</a> at Wikimedia Commons </p> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Information_security" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Information_security" title="Template:Information security"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Information_security" title="Template talk:Information security"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Information_security" title="Special:EditPage/Template:Information security"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Information_security" style="font-size:114%;margin:0 4em"><a href="/wiki/Information_security" title="Information security">Information security</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related security categories</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Automotive_security" title="Automotive security">Automotive security</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a> <ul><li><a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></li> <li><a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></li></ul></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electromagnetic_warfare" class="mw-redirect" title="Electromagnetic warfare">Electromagnetic warfare</a></li> <li><a href="/wiki/Information_warfare" title="Information warfare">Information warfare</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></li> <li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li></ul> </div></td><td class="noviewer navbox-image" rowspan="3" style="width:1px;padding:0 0 0 2px"><div><figure class="mw-halign-center" typeof="mw:File"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description" title="vectorial version"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/150px-CIAJMK1209-en.svg.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/225px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/300px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption>vectorial version</figcaption></figure></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">Threats</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced persistent threat</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">Arbitrary code execution</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li>Bombs <ul><li><a href="/wiki/Fork_bomb" title="Fork bomb">Fork</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic</a></li> <li><a href="/wiki/Time_bomb_(software)" title="Time bomb (software)">Time</a></li> <li><a href="/wiki/Zip_bomb" title="Zip bomb">Zip</a></li></ul></li> <li><a href="/wiki/Hardware_backdoor" title="Hardware backdoor">Hardware backdoors</a></li> <li><a href="/wiki/Code_injection" title="Code injection">Code injection</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Cross-site_scripting" title="Cross-site scripting">Cross-site scripting</a></li> <li><a href="/wiki/Cross-site_leaks" title="Cross-site leaks">Cross-site leaks</a></li> <li><a href="/wiki/DOM_clobbering" title="DOM clobbering">DOM clobbering</a></li> <li><a href="/wiki/History_sniffing" title="History sniffing">History sniffing</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnets</a></li> <li><a href="/wiki/Data_breach" title="Data breach">Data breach</a></li> <li><a href="/wiki/Drive-by_download" title="Drive-by download">Drive-by download</a></li> <li><a href="/wiki/Browser_Helper_Object" title="Browser Helper Object">Browser Helper Objects</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Viruses</a></li> <li><a href="/wiki/Data_scraping" title="Data scraping">Data scraping</a></li> <li><a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">Denial-of-service attack</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Email_spoofing" title="Email spoofing">Email spoofing</a></li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploits</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialers</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Insecure_direct_object_reference" title="Insecure direct object reference">Insecure direct object reference</a></li> <li><a class="mw-selflink selflink">Keystroke loggers</a></li> <li><a href="/wiki/Malware" title="Malware">Malware</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a> <ul><li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice</a></li></ul></li> <li><a href="/wiki/Polymorphic_engine" title="Polymorphic engine">Polymorphic engine</a></li> <li><a href="/wiki/Privilege_escalation" title="Privilege escalation">Privilege escalation</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkits</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shellcode" title="Shellcode">Shellcode</a></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Software_bug" title="Software bug">Software bugs</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a></li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojans</a></li> <li><a href="/wiki/Remote_access_trojan" class="mw-redirect" title="Remote access trojan">Remote access trojans</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shells</a></li> <li><a href="/wiki/Wiper_(malware)" title="Wiper (malware)">Wiper</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worms</a></li> <li><a href="/wiki/SQL_injection" title="SQL injection">SQL injection</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defenses</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a> <ul><li><a href="/wiki/Secure_coding" title="Secure coding">Secure coding</a></li> <li>Secure by default</li> <li><a href="/wiki/Secure_by_design" title="Secure by design">Secure by design</a> <ul><li><a href="/wiki/Misuse_case" title="Misuse case">Misuse case</a></li></ul></li></ul></li> <li><a href="/wiki/Computer_access_control" title="Computer access control">Computer access control</a> <ul><li><a href="/wiki/Authentication" title="Authentication">Authentication</a> <ul><li><a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></li></ul></li> <li><a href="/wiki/Authorization" title="Authorization">Authorization</a></li></ul></li> <li><a href="/wiki/Computer_security_software" title="Computer security software">Computer security software</a> <ul><li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Security-focused_operating_system" title="Security-focused operating system">Security-focused operating system</a></li></ul></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Code_obfuscation" class="mw-redirect" title="Code obfuscation">Obfuscation (software)</a></li> <li><a href="/wiki/Data_masking" title="Data masking">Data masking</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a> <ul><li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">Host-based intrusion detection system</a> (HIDS)</li> <li><a href="/wiki/Anomaly_detection" title="Anomaly detection">Anomaly detection</a></li></ul></li> <li><a href="/wiki/Information_security_management" title="Information security management">Information security management</a> <ul><li><a href="/wiki/Information_risk_management" class="mw-redirect" title="Information risk management">Information risk management</a></li> <li><a href="/wiki/Security_information_and_event_management" title="Security information and event management">Security information and event management</a> (SIEM)</li></ul></li> <li><a href="/wiki/Runtime_application_self-protection" title="Runtime application self-protection">Runtime application self-protection</a></li> <li><a href="/wiki/Site_isolation" title="Site isolation">Site isolation</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Malware_topics" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Malware" title="Template:Malware"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Malware" title="Template talk:Malware"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Malware" title="Special:EditPage/Template:Malware"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Malware_topics" style="font-size:114%;margin:0 4em"><a href="/wiki/Malware" title="Malware">Malware</a> topics</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Infectious malware</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Comparison_of_computer_viruses" title="Comparison of computer viruses">Comparison of computer viruses</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Computer worm</a></li> <li><a href="/wiki/List_of_computer_worms" title="List of computer worms">List of computer worms</a></li> <li><a href="/wiki/Timeline_of_computer_viruses_and_worms" title="Timeline of computer viruses and worms">Timeline of computer viruses and worms</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Concealment</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a href="/wiki/Clickjacking" title="Clickjacking">Clickjacking</a></li> <li><a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">Man-in-the-browser</a></li> <li><a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">Man-in-the-middle</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie computer</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Malware for profit</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Fleeceware" title="Fleeceware">Fleeceware</a></li> <li><a href="/wiki/Form_grabbing" title="Form grabbing">Form grabbing</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialer</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a class="mw-selflink selflink">Keystroke logging</a></li> <li><a href="/wiki/Internet_bot#Malicious_purposes" title="Internet bot">Malbot</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Web_threat" title="Web threat">Web threats</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">By operating system</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Category:Android_(operating_system)_malware" title="Category:Android (operating system) malware">Android malware</a></li> <li><a href="/wiki/Category:Classic_Mac_OS_viruses" title="Category:Classic Mac OS viruses">Classic Mac OS viruses</a></li> <li><a href="/wiki/Category:IOS_malware" title="Category:IOS malware">iOS malware</a></li> <li><a href="/wiki/Linux_malware" title="Linux malware">Linux malware</a></li> <li><a href="/wiki/Category:MacOS_malware" title="Category:MacOS malware">MacOS malware</a></li> <li><a href="/wiki/Macro_virus" title="Macro virus">Macro virus</a></li> <li><a href="/wiki/Mobile_malware" title="Mobile malware">Mobile malware</a></li> <li><a href="/wiki/Palm_OS_viruses" title="Palm OS viruses">Palm OS viruses</a></li> <li><a href="/wiki/HyperCard_viruses" class="mw-redirect" title="HyperCard viruses">HyperCard viruses</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Protection</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></li> <li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Browser_security" title="Browser security">Browser security</a></li> <li><a href="/wiki/Data_loss_prevention_software" title="Data loss prevention software">Data loss prevention software</a></li> <li><a href="/wiki/Defensive_computing" title="Defensive computing">Defensive computing</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Countermeasures</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Honeypot_(computing)" title="Honeypot (computing)">Honeypot</a></li> <li><a href="/wiki/Operation:_Bot_Roast" title="Operation: Bot Roast">Operation: Bot Roast</a></li></ul> </div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐api‐ext.codfw.main‐74d78f4769‐f8pfp Cached time: 20241127144040 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 0.714 seconds Real time usage: 0.830 seconds Preprocessor visited node count: 3679/1000000 Post‐expand include size: 119249/2097152 bytes Template argument size: 2680/2097152 bytes Highest expansion depth: 16/100 Expensive parser function count: 7/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 190766/5000000 bytes Lua time usage: 0.454/10.000 seconds Lua memory usage: 8998353/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 714.810 1 -total 56.09% 400.968 1 Template:Reflist 16.71% 119.453 25 Template:Cite_web 15.14% 108.228 6 Template:Cite_journal 9.79% 69.974 2 Template:Navbox 9.58% 68.474 1 Template:Information_security 8.40% 60.057 8 Template:Cite_conference 8.04% 57.472 1 Template:Short_description 6.03% 43.110 2 Template:Fix 4.95% 35.377 1 Template:When --> <!-- Saved in parser cache with key enwiki:pcache:idhash:57829-0!canonical and timestamp 20241127144100 and revision id 1259868583. Rendering was triggered because: edit-page --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Keystroke_logging&amp;oldid=1259868583">https://en.wikipedia.org/w/index.php?title=Keystroke_logging&amp;oldid=1259868583</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Cryptographic_attacks" title="Category:Cryptographic attacks">Cryptographic attacks</a></li><li><a href="/wiki/Category:Spyware" title="Category:Spyware">Spyware</a></li><li><a href="/wiki/Category:Surveillance" title="Category:Surveillance">Surveillance</a></li><li><a href="/wiki/Category:Cybercrime" title="Category:Cybercrime">Cybercrime</a></li><li><a href="/wiki/Category:Security_breaches" title="Category:Security breaches">Security breaches</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:All_articles_with_vague_or_ambiguous_time" title="Category:All articles with vague or ambiguous time">All articles with vague or ambiguous time</a></li><li><a href="/wiki/Category:Vague_or_ambiguous_time_from_January_2021" title="Category:Vague or ambiguous time from January 2021">Vague or ambiguous time from January 2021</a></li><li><a href="/wiki/Category:Wikipedia_articles_needing_clarification_from_November_2017" title="Category:Wikipedia articles needing clarification from November 2017">Wikipedia articles needing clarification from November 2017</a></li><li><a href="/wiki/Category:Wikipedia_articles_needing_clarification_from_January_2021" title="Category:Wikipedia articles needing clarification from January 2021">Wikipedia articles needing clarification from January 2021</a></li><li><a href="/wiki/Category:Commons_category_link_from_Wikidata" title="Category:Commons category link from Wikidata">Commons category link from Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 27 November 2024, at 14:40<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Keystroke_logging&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-6df7948d6c-x8q66","wgBackendResponseTime":200,"wgPageParseReport":{"limitreport":{"cputime":"0.714","walltime":"0.830","ppvisitednodes":{"value":3679,"limit":1000000},"postexpandincludesize":{"value":119249,"limit":2097152},"templateargumentsize":{"value":2680,"limit":2097152},"expansiondepth":{"value":16,"limit":100},"expensivefunctioncount":{"value":7,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":190766,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 714.810 1 -total"," 56.09% 400.968 1 Template:Reflist"," 16.71% 119.453 25 Template:Cite_web"," 15.14% 108.228 6 Template:Cite_journal"," 9.79% 69.974 2 Template:Navbox"," 9.58% 68.474 1 Template:Information_security"," 8.40% 60.057 8 Template:Cite_conference"," 8.04% 57.472 1 Template:Short_description"," 6.03% 43.110 2 Template:Fix"," 4.95% 35.377 1 Template:When"]},"scribunto":{"limitreport-timeusage":{"value":"0.454","limit":"10.000"},"limitreport-memusage":{"value":8998353,"limit":52428800}},"cachereport":{"origin":"mw-api-ext.codfw.main-74d78f4769-f8pfp","timestamp":"20241127144040","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Keystroke logging","url":"https:\/\/en.wikipedia.org\/wiki\/Keystroke_logging","sameAs":"http:\/\/www.wikidata.org\/entity\/Q309396","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q309396","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-06-17T17:42:02Z","dateModified":"2024-11-27T14:40:39Z","headline":"program that records the keys struck on a keyboard"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10