A growing illegal use of computer monitoring software is for a hacker to use a(n) ____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.

Fill in the blank(s) with the appropriate word(s).

keystroke logging

Computer Science & Information Technology

You might also like to view...

Page Count is one field that can be added to a footer or a header

Indicate whether the statement is true or false

Computer Science & Information Technology

A single word can be both tracked and kerned.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology