Microsoft Download Center Archive

I Know What You Did Last Logon - Monitoring Software, Spyware, and Privacy

  • Published:
  • Version: 1
  • Language: English

We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.

To some, the thought of keystroke logging and other forms of monitoring bring to mind the Orwellian surveillance society – a view that is reinforced by recent news as well as the increasing presence of monitoring software in spyware and the frequency with which such software is found accompanying botnets. The act of capturing keystrokes on a computer as well as other forms of monitoring can manifest in a range of ways from completely benign to overtly criminal. In cases where the logged party is unaware of the activity there is also the possibility of financial impact through various types of fraud as well as personal endangerment when the monitoring is a component of stalking or domestic violence. However, monitoring also has legitimate commercial uses such as consensual workplace monitoring, parental controls and computer troubleshooting. We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.

We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.


This paper was originally presented at the 2006 Virus Bulletin Conference in Montreal, on October 12, 2006.

Files

Status: Deleted

This download is no longer available on microsoft.com. The downloads below are archives provided by the Internet Archive Wayback Machine from the Microsoft Download Center prior to May 2012.

No files found

File sizes and hashes are retrieved from the Wayback Machine’s indexes. They may not match the latest versions of files hosted on Microsoft servers.

System Requirements

Operating Systems: Windows XP

Supported operating systems: Windows XP


The whitepaper requires Adobe Acrobat Reader to view.

Installation Instructions

Download the white paper to your computer and open it in Adobe Acrobat Reader to view.

This page was generated from a snapshot of the Microsoft Download Center made on .