Interactive Keylogging System to Discover Abuser Activity
ثبت نشده
چکیده
The windows based application which helps the admin to track the activities of the user. It works as a spy in a computer. It tracks the user keyboard entries such the key strokes entered by the user and it forms a word then it saves into the database. It has a login in order to authenticate the admin whether the user has rights turn on or off the application to track the user keystrokes. It forms a word using the separator as a space and wildcards such as question mark, full stop, comma, etc. The key logging system is J. Rajeshwari et al, International Journal of Computer Science and Mobile Computing, Vol.4 Issue.3, March2015, pg. 180-185 © 2015, IJCSMC All Rights Reserved 181 done using GlobalHook technique. It receives the user keystrokes before it reach the user interface. The list of keystrokes are unruffled in this method and form a meaningful word by identifying the separator such as space, comma, semi colon, etc. Key Termskeystroke logging, access control, globalhook technique.
منابع مشابه
Examining the consequences of sexual harassment by blood relative
Introduction: Sexual harassment with family member is a crime within the family that exposes not only the abuser but also other family members to deep harm. The domination of the abuser over the victim and the preservation of the family atmosphere and the occurrence of this crime in the blind spot of the society leads to the repression of the persecution and the continuation of the consequences...
متن کاملExamining the consequences of sexual harassment by blood relative
Introduction: Sexual harassment with family member is a crime within the family that exposes not only the abuser but also other family members to deep harm. The domination of the abuser over the victim and the preservation of the family atmosphere and the occurrence of this crime in the blind spot of the society leads to the repression of the persecution and the continuation of the consequences...
متن کاملInteractive Runtime Verification
Monitoring is the study of a system at runtime, looking for input and output events to discover, check or enforce behavioral properties. Interactive debugging is the study of a system at runtime in order to discover and understand its bugs and x them, inspecting interactively its internal state. Interactive Runtime Veri cation (i-RV) combines monitoring and interactive debugging. We de ne an e ...
متن کاملUser’s Interaction with Information through eFront Learning Management System
Background and Aim: In order to comprehension of interactive content and content production standards, and also users interaction with LMSs, and their behavior in dealing with information, the aim of this paper is to examine the users interaction information provided in the eFront application, an open source Learning Management System, by emphasizing SCORM standard. Method: The method that used...
متن کاملFacilitating Internalization in E-Learning Through New Information System
This paper aims to study Vygotsky’s (1987) sociocultural theory of learning with respect to how it relates to technology-based second language learning and teaching. The researchers selected their participants from advanced students from Payame Noor University. We divided the participants into two groups- an experimental group and a control group. After teaching the course an experimental group...
متن کامل