Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings

International Conference on Measurement and Control Engineering 2nd (ICMCE 2011)

Yi Xie
Yi Xie
Search for other works by this author on:
No. of Pages:
ASME Press
Publication date:

There exist many ways to log a user's keyboard input characters as a way to steal vital information, here we will describe two efficient and common ways of remote hook of Windows platform and virtual keyboard device and we will show how to implement the hook method. After all we will introduce several ways to protect windows PCs from such attack of keylogger.

This content is only available via PDF.
You do not currently have access to this chapter.
Close Modal

or Create an Account

Close Modal
Close Modal