Disclaimer

The information provided in this article is purely for educational purpose and for computer security awareness. The views expressed in this article are purely based on my experience and does not reflect the views of my present or past employers. The author does not promote computer hacking in any way or the misuse of this information against any individual or organization. Computer hacking and identity theft is a punishable offense. The author can not be held liable for any kind of damages done whatsoever to your machine, or damages caused by the use of information provided in this article. By reading this article you agree to those terms.

Introduction

We are living in the cyber age. Computers are being used in some of the most important places. Just as we are concerned about our physical security, we must have a basic awareness of security for our cyber presence as well. There is a saying that a similarity exists between a successful magic trick and a successful hack. After the act, everyone has one mystery question: How did you do that? This article attempts to throw light on one of the most common way of information theft - keystroke logging.