Microsoft 11737 Published by

We will explore the technical methods employed by both hardware and software-based key loggers, how keystroke loggers are integrated with specific malware threats, the user experience associated with various key loggers installed, and examine the social and legal appropriateness of various use scenarios.

I Know What You Did Last Logon - Monitoring Software, Spyware, and Privacy