Personal internet Security : 5th report of session 2006-07, Vol. 2: EvidenceAllow the victim to perform their usual tasks, eg accessing email. ... Attach the keystroke logger to another computer. ... They can then use another computer, anywhere on the Internet, to see what is on their victima#39;s screen, and to see which keys the victim is ... It is not necessary to return to the victima#39;s PC to retrieve data.
|Title||:||Personal internet security|
|Author||:||Great Britain: Parliament: House of Lords: Science and Technology Committee|
|Publisher||:||The Stationery Office - 2007-08-10|