Displaying 3 results from an estimated 3 matches for "keylog".
2007 Sep 18
1
program to monitor USB keys
...ode);
if(event_keys[0].type == 1
&& event_keys[0].value == 1)
{
keycode = event_keys[0].code;
for(find_key = 0; msgnet_keycode[find_key].keycode_str; find_key++)
{
if(msgnet_keycode[find_key].keycode_value == keycode)
{
KeyLog(find_key);
break;
}
}
}
}
else if(bytes_read < 0)
{
if(errno == EAGAIN)
{
/* EAGAIN is common on keyboard inputs */
/* but it HAPPENS ALOT */
}
else
{
printf("Disconnect read=%d i=%d err...
2003 Sep 16
5
boot -s - can i detect intruder
Hi list
Several people have physical access to my FreeBSD box and I have the feeling
that somebody try to get access with boot -s options . Can I log activity
after boot -s option (change user password, install software and etc.).
I use boot -s and change user password, but after reboot i can't find this
atcivity in log files.
The BSD box is shutdown and run again many time at day.
Best
2004 Feb 28
4
[Bug 803] Security Bug: X11 Forwarding is more powerful than it needs to be.
...rmines that X11 forwarding
ftp://ftp.dfn-cert.de/pub/docs/crypt/ssh-x11.ps.gz
in response Alan Cox suggested that X11 Security Extensions may be used
to limit the access of remote applications to the local X11 server
2004 X11 Forwarding is as dangerous as it was 1995:
- keylogging (even though "secure keyboard" is used in
(xterm|ssh-agent|xscreensaver)
- I was able to attach a X0vncserver process on an forwarded X-display
and got complete remote control.
- screenshots of root window is possible through 'xwd' or ImageMagick'...