1. By Andrew Ranson 2. Remembers every key pressed by the computer operator Sometimes used for illegal purposes e.g. Stealing passwords or encryption keys Can be used by…
Slide 1 Distributed Systems CS 15-440 Security – Part I Lecture 21, Nov 28, 2011 Majd F. Sakr, Vinay Kolar, Mohammad Hammoud Slide 2 Today… Last Sessions Programming…