Trojan

(redirected from Keystroke logger)
Also found in: Dictionary, Thesaurus, Encyclopedia.
A proprietary condom which, like Hoovers in the UK and Kleenex in the US, has become a genericised trademark

Trojan

A proprietary condom–the term is used in the US like Kleenex
References in periodicals archive ?
Trojans, keystroke loggers and system monitors are capable of capturing keystrokes, online screenshots and personally identifiable information like your bank account numbers, logins and passwords or credit card numbers.
Other variations of the attack place keystroke loggers on victims' computers enabling the spammer to collect personal information--including passwords and financial account data--from the victim.
A growing number of leading anti-virus vendors provide technology that identifies spyware, adware, keystroke loggers and other malicious code.
EarthLink said that in a little over one million PC scans executed by its SpyAudit service, it found 184,559 installations of "system monitor" software, such as keystroke loggers, and 184,919 installations of Trojan programs.
Keystroke loggers also walk the fine line between security administration and security breach.
Consequently password sniffers, keystroke loggers, spoofing and all other typical tools of current day hackers will be rendered useless
According to Symantec, WholeSecurity's solutions protect PCs from crimeware including worms, Trojan horses, keystroke loggers and phishing attacks by leveraging behavioural technology to protect users on both managed and unmanaged PCs.
The author explains many of these schemes, such as keystroke loggers and cleartext file transfers via file transfer protocol (FTP).
95 application looks for the presence of spyware such as advertising software, keystroke loggers, and other wares that interfere with the performance of PCs or compromise the user's privacy.
NIS 2004 includes"Expanded Threat Detection" to protect against spyware, adware, keystroke loggers and other hacking tools.
According to the company, behavior-based security technology identifies online threats such as worms, viruses, Trojan horses, keystroke loggers, and phishing sites by their actions and characteristics, without the need for traditional security signatures.
ID Vault delivers instant, secure access to users' online accounts with a single PIN to provide automatic protection against phishing, pharming, spyware, keystroke loggers and other online threats.