How easily espionage (keystroke monitoring) program can be installed?
Keystroke monitoring software may be distributed and installed locally, i.e. through floppy disk, networks, etc, or it may be distributed remotely. Keystroke monitoring program may be enveloped in a Trojan or virus, and be distributed via email. More advanced keystroke monitoring program will then email the recorded key logs silently – the user will never know it is there! For example – the newest computer viruses send email messages with infected attached files, as well as install spying Trojan component to steal information from infected systems.
Related Questions
- I do not want the person that I am monitoring to know i have installed an internet spying program. How well are Spector Pro and eBlaster hidden?
- Why there were no programs, which were able to detect all espionage (keystroke monitoring) programs?
- What is Espionage Software? What is Keystroke Monitoring Software?