Keyloggers - Deepstash

Keyloggers

Keyloggers attempt to get sensitive information from a target.

The hardware of software is used to record all the keystrokes an individual enters on their devices. The individual is usually unaware of its presence on their device and may stroke sensitive information such as financial transactions.

10

60 reads

The idea is part of this collection:

Design Frameworks

Learn more about cybersecurity with this collection

How to beat procrastination

How to enhance your creative thinking

How to create a smooth transition in a new endeavor

Related collections

Similar ideas to Keyloggers

Models and mechanisms

Models are the step between creating a policy and implementing it. They include detailed rule descriptions that don't depend on any given hardware, software or other mechanisms. 

Mechanisms can be software-based, such as an access control list or a physical item lik...

Finding your reward in information

Much research on dopamine has been done about its role to desire an "appetitive" reward, such as chocolate, social attention, or gambling. However, people who score high in the tendency toward exploration are prone to find their reward in information, not so much in money or drug...

The use of social media

Social media can be a great tool for connecting with people, but it is not suitable to obtain information. It is not a replacement for books or articles.

Most people are unaware that they are being used on social media. They may think they're in control, but they're influenced all the time...

Read & Learn

20x Faster

without
deepstash

with
deepstash

with

deepstash

Personalized microlearning

100+ Learning Journeys

Access to 200,000+ ideas

Access to the mobile app

Unlimited idea saving

Unlimited history

Unlimited listening to ideas

Downloading & offline access

Supercharge your mind with one idea per day

Enter your email and spend 1 minute every day to learn something new.

Email

I agree to receive email updates