Trojan

(redirected from Keystroke logger)
Also found in: Dictionary, Thesaurus, Encyclopedia.
A proprietary condom which, like Hoovers in the UK and Kleenex in the US, has become a genericised trademark

Trojan

A proprietary condom–the term is used in the US like Kleenex
References in periodicals archive ?
A limitation of software keystroke loggers is the availability of several different keyloggers that are specific for research purposes and can be used online.
The miniaturization of recording and data storage devices does not just increase the chances that an employee or trusted agent of a facility may bring valuable data out of the facility, it also allows someone with vindictive intent to transport harmful data, such as viruses, malicious software, keystroke loggers or hacking programs, into a secure facility.
But the smaller attacks, which are on the rise, have actually become the greater threat because they are used to steal valuable data, such as credit-card or other sensitive customer information; and, Turner says, as these infections download crime-ware like keystroke loggers and stealthily spread to other machines and networks, "they become category three and four threats after the fact.
According to Trend Micro, HouseCall Server Edition helps fight threats such as viruses, spyware and keystroke loggers, and extends support to Linux and Solaris-based operating systems and Firefox and Mozilla-based browsers.
Trojans, keystroke loggers and system monitors are capable of capturing keystrokes, online screenshots and personally identifiable information like your bank account numbers, logins and passwords or credit card numbers.
More sinister types of spyware, such as keystroke loggers, can capture everything a person types, including passwords, financial information, and the contents of e-mail messages.
Other variations of the attack place keystroke loggers on victims' computers enabling the spammer to collect personal information--including passwords and financial account data--from the victim.
Keystroke loggers also walk the fine line between security administration and security breach.
Consequently password sniffers, keystroke loggers, spoofing and all other typical tools of current day hackers will be rendered useless
Password and other sensitive information transmitted by SSL technology is increasingly subject to theft by keystroke loggers, i.
The author explains many of these schemes, such as keystroke loggers and cleartext file transfers via file transfer protocol (FTP).
EarthLink said that in a little over one million PC scans executed by its SpyAudit service, it found 184,559 installations of "system monitor" software, such as keystroke loggers, and 184,919 installations of Trojan programs.