A growing illegal use of computer monitoring software is for a hacker to use a(n) ____________________ system to capture usernames, passwords, and other sensitive data entered into the computer via the keyboard.
Fill in the blank(s) with the appropriate word(s).
keystroke logging
Computer Science & Information Technology
You might also like to view...
Page Count is one field that can be added to a footer or a header
Indicate whether the statement is true or false
Computer Science & Information Technology
A single word can be both tracked and kerned.
Answer the following statement true (T) or false (F)
Computer Science & Information Technology