ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

System Monitoring and Security Using Keylogger?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 3)

Publication Date:

Authors : ;

Page : 106-111

Keywords : Email monitoring; Internet monitoring; Computer monitoring; Chats/IM is monitoring; Network monitoring; Document monitoring; Web site monitoring; Productivity monitoring; keylogging;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

It is likely that about one out of many large companies systematically monitors the computer, internet, or email use of its users employees. There are over hundred’s different products available today that will let organizations see what their users do at work on their "personal" computers, in their email, and on the internet. But what do such numbers really mean? What does company monitoring of user/employee email, internet, and computer usage actually look like? What sorts of things can an organization/company see users do at their computers, and what sorts of computer activities are currently invisible to workplace monitoring? This admittedly document attempts to propose, as concretely as possible what "Informational Flow" on internet and computer usage looks like: its extent, the key concepts involved, and the forces driving its adoption. The keylogging program logs all keystrokes (aka Keystroke Logging) along with the name of the application in which the keystrokes were entered. Using keylogger we prevent the miscellaneous use of system. Using this we capture all information in text and image form.

Last modified: 2013-04-20 19:57:54