|
|
I Know What You Did Last Logon - Monitoring Software, Spyware, and Privacy |
We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.
To some, the thought of keystroke logging and other forms of monitoring bring to mind the Orwellian surveillance society – a view that is reinforced by recent news as well as the increasing presence of monitoring software in spyware and the frequency with which such software is found accompanying botnets. The act of capturing keystrokes on a computer as well as other forms of monitoring can manifest in a range of ways from completely benign to overtly criminal. In cases where the logged party is unaware of the activity there is also the possibility of financial impact through various types of fraud as well as personal endangerment when the monitoring is a component of stalking or domestic violence. However, monitoring also has legitimate commercial uses such as consensual workplace monitoring, parental controls and computer troubleshooting. We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.
We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.
This paper was originally presented at the 2006 Virus Bulletin Conference in Montreal, on October 12, 2006.
Files
|
|
Status: DeletedThis download is no longer available on microsoft.com. The downloads below are archives provided by the Internet Archive Wayback Machine from the Microsoft Download Center prior to May 2012. |
No files found
A file listing was not found in the Wayback Machine archives.
System Requirements
Operating Systems: Windows XP
Supported operating systems: Windows XP
The whitepaper requires Adobe Acrobat Reader to view.
Installation Instructions
Download the white paper to your computer and open it in Adobe Acrobat Reader to view.