@prefix dbo: . @prefix dbr: . dbr:Keylogging_software dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Microsoft_Digital_Crimes_Unit dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:USB_dead_drop dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Blackshades dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Hack_Forums dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Advance-fee_scam dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Norton_AntiVirus dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Norton_Internet_Security dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:genre dbr:Keystroke_logging . @prefix dbp: . dbp:genre dbr:Keystroke_logging . dbr:Outline_of_computer_security dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Adobe_Acrobat_version_history dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Badtrans dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Malicious_Software_Removal_Tool dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Webattacker dbo:wikiPageWikiLink dbr:Keystroke_logging . @prefix foaf: . @prefix wikipedia-en: . wikipedia-en:Keystroke_logging foaf:primaryTopic dbr:Keystroke_logging . dbr:Password_manager dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Internet_security dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Security_hacker dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Electronic_voting_in_the_United_States dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Stalkerware dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:OTPW dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:NjRAT dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Norton_360 dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Sharyl_Attkisson dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:ZeuS_Panda dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Employee_monitoring_software dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Mouse_tracking dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Identity_theft dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Carrier_IQ dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Network_eavesdropping dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Security_question dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Digital_signature dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:ANT_catalog dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Creech_Air_Force_Base dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Typing dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Crimeware dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:CA_Anti-Spyware dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Black-bag_cryptanalysis dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Daprosy_Worm dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Computer_virus dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Spyware dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Cyberattack dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Encrypting_File_System dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Grok dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Relay_Gold dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Macro_recorder dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Tracking_software dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Sub7 dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:NetBus dbo:wikiPageWikiLink dbr:Keystroke_logging . @prefix rdf: . @prefix yago: . dbr:Keystroke_logging rdf:type yago:Abstraction100002137 , yago:Transgression100745005 , yago:Event100029378 , dbo:MusicGenre , yago:YagoPermanentlyLocatedEntity , dbo:MilitaryConflict , yago:Crime100766234 , yago:Wrongdoing100732746 , yago:Feat100036762 , yago:PsychologicalFeature100023100 , yago:Accomplishment100035189 , yago:WikicatCryptographicAttacks , yago:Attack100972621 , yago:Act100030358 , yago:Operation100955060 , yago:Activity100407535 , yago:Action100037396 , yago:WikicatComputerCrimes , yago:WikicatComputerSecurityExploits . @prefix rdfs: . dbr:Keystroke_logging rdfs:label "\u041A\u0435\u0439\u043B\u043E\u0433\u0435\u0440"@ru , "Keylogger"@sv , "Keylogger"@pt , "Keylogger"@it , "Keylogger"@ca , "Keylogger"@eu , "Keylogger"@de , "Keylogger"@cs , "\u0631\u0627\u0635\u062F \u0644\u0648\u062D\u0629 \u0645\u0641\u0627\u062A\u064A\u062D"@ar , "\u952E\u76D8\u8BB0\u5F55"@zh , "Perekam ketikan"@in , "Keylogger"@nl , "\u30AD\u30FC\u30ED\u30AC\u30FC"@ja , "\u039A\u03B1\u03C4\u03B1\u03B3\u03C1\u03B1\u03C6\u03AE \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B7\u03C3\u03B7\u03C2"@el , "Keylogger"@uk , "\uD0A4\uB85C\uAE45"@ko , "Keylogger"@pl , "Keystroke logging"@en , "Keylogger"@es , "Enregistreur de frappe"@fr ; rdfs:comment "\u0397 \u03BA\u03B1\u03C4\u03B1\u03B3\u03C1\u03B1\u03C6\u03AE \u03C4\u03B7\u03C2 \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B7\u03C3\u03B7\u03C2, \u03C0\u03BF\u03C5 \u03C3\u03C5\u03C7\u03BD\u03AC \u03B1\u03BD\u03B1\u03C6\u03AD\u03C1\u03B5\u03C4\u03B1\u03B9 \u03C9\u03C2 keylogging \u03AE keyboard capturing, \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B7 \u03B4\u03C1\u03AC\u03C3\u03B7 \u03C4\u03B7\u03C2 \u03BA\u03B1\u03C4\u03B1\u03B3\u03C1\u03B1\u03C6\u03AE\u03C2 \u03C4\u03C9\u03BD \u03C0\u03BB\u03AE\u03BA\u03C4\u03C1\u03C9\u03BD \u03C0\u03BF\u03C5 \u03C0\u03B1\u03C4\u03AE\u03B8\u03B7\u03BA\u03B1\u03BD \u03C3\u03B5 \u03AD\u03BD\u03B1 \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B9\u03BF, \u03C3\u03C5\u03BD\u03AE\u03B8\u03C9\u03C2 \u03BA\u03C1\u03C5\u03C6\u03AC, \u03AD\u03C4\u03C3\u03B9 \u03CE\u03C3\u03C4\u03B5 \u03C4\u03BF \u03AC\u03C4\u03BF\u03BC\u03BF \u03C0\u03BF\u03C5 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03B5\u03AF \u03C4\u03BF \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B9\u03BF \u03BD\u03B1 \u03BC\u03B7\u03BD \u03B3\u03BD\u03C9\u03C1\u03AF\u03B6\u03B5\u03B9 \u03CC\u03C4\u03B9 \u03BF\u03B9 \u03B5\u03BD\u03AD\u03C1\u03B3\u03B5\u03B9\u03AD\u03C2 \u03C4\u03BF\u03C5 \u03C0\u03B1\u03C1\u03B1\u03BA\u03BF\u03BB\u03BF\u03C5\u03B8\u03BF\u03CD\u03BD\u03C4\u03B1\u03B9. \u0397 \u03BA\u03B1\u03C4\u03B1\u03B3\u03C1\u03B1\u03C6\u03AE \u03C4\u03B7\u03C2 \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B7\u03C3\u03B7\u03C2 (Keylogging) \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03B5\u03C0\u03AF\u03C3\u03B7\u03C2 \u03BD\u03B1 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03B7\u03B8\u03B5\u03AF \u03B3\u03B9\u03B1 \u03C4\u03B7 \u03BC\u03B5\u03BB\u03AD\u03C4\u03B7 \u03C4\u03B7\u03C2 \u03B1\u03BB\u03BB\u03B7\u03BB\u03B5\u03C0\u03AF\u03B4\u03C1\u03B1\u03C3\u03B7\u03C2 \u03B1\u03BD\u03B8\u03C1\u03CE\u03C0\u03BF\u03C5\u2013\u03C5\u03C0\u03BF\u03BB\u03BF\u03B3\u03B9\u03C3\u03C4\u03AE. \u03A5\u03C0\u03AC\u03C1\u03C7\u03BF\u03C5\u03BD \u03C0\u03BF\u03BB\u03BB\u03AD\u03C2 \u03BC\u03AD\u03B8\u03BF\u03B4\u03BF\u03B9 keylogging, \u03BF\u03B9 \u03BF\u03C0\u03BF\u03AF\u03B5\u03C2 \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03BD\u03B1 \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B2\u03B1\u03C3\u03B9\u03C3\u03BC\u03AD\u03BD\u03B5\u03C2 \u03C3\u03C4\u03BF \u03C5\u03BB\u03B9\u03BA\u03CC (hardware) \u03BA\u03B1\u03B9 \u03C4\u03BF \u03BB\u03BF\u03B3\u03B9\u03C3\u03BC\u03B9\u03BA\u03CC (software) \u03C4\u03BF\u03C5 \u03C5\u03C0\u03BF\u03BB\u03BF\u03B3\u03B9\u03C3\u03C4\u03AE \u03AE \u03B1\u03BA\u03CC\u03BC\u03B1 \u03BA\u03B1\u03B9 \u03BD\u03B1 \u03C3\u03C4\u03B7\u03C1\u03AF\u03B6\u03BF\u03BD\u03C4\u03B1\u03B9 \u03C3\u03C4\u03B7\u03BD \u03B1\u03BA\u03BF\u03C5\u03C3\u03C4\u03B9\u03BA\u03AE \u03B1\u03BD\u03AC\u03BB\u03C5\u03C3\u03B7."@el , "\uD0A4\uB85C\uAE45(Keylogging, \uD0A4 \uC2A4\uD2B8\uB85C\uD06C \uB85C\uAE45(Keystroke logging)\uC73C\uB85C\uB3C4 \uBD88\uB9BC)\uC740 \uC0AC\uC6A9\uC790\uAC00 \uD0A4\uBCF4\uB4DC\uB85C PC\uC5D0 \uC785\uB825\uD558\uB294 \uB0B4\uC6A9\uC744 \uBAB0\uB798 \uAC00\uB85C\uCC44\uC5B4 \uAE30\uB85D\uD558\uB294 \uD589\uC704\uB97C \uB9D0\uD55C\uB2E4. \uD558\uB4DC\uC6E8\uC5B4, \uC18C\uD504\uD2B8\uC6E8\uC5B4\uB97C \uD65C\uC6A9\uD55C \uBC29\uBC95\uC5D0\uC11C\uBD80\uD130 \uC804\uC790\uC801, \uC74C\uD5A5\uAE30\uC220\uC744 \uD65C\uC6A9\uD55C \uAE30\uBC95\uAE4C\uC9C0 \uB2E4\uC591\uD55C \uD0A4\uB85C\uAE45 \uBC29\uBC95\uC774 \uC874\uC7AC\uD55C\uB2E4."@ko , "Een keylogger is een programma of een stuk hardware waarmee men de toetsaanslagen tot zelfs de muisbewegingen van een computergebruiker kan registreren."@nl , "Keylogger (ingelesetik: \"Key\" tekla eta \"Logger\" erregistratzailea; teklen erregistratzailea). Teklatuan egiten diren pultsazioak erregistratzeaz arduratzen den software mota bat da. Erabiltzaileen kontu korrontea, kreditu txartelaren zenbakia, pasahitzak eta horrelako datu pribatu eta garrantzitsuak biltzeko erabiltzen da, besteak beste."@eu , "Keylogger (ang. key \u201Eklawisz\u201D, logger \u201Erejestrator\u201D) \u2013 rodzaj oprogramowania lub urz\u0105dzenia rejestruj\u0105cego klawisze naciskane przez u\u017Cytkownika. Na og\u00F3\u0142 s\u0105 spotykane w wersji programowej, rzadziej w sprz\u0119towej. Keylogger mo\u017Ce by\u0107 zar\u00F3wno szkodliwym oprogramowaniem s\u0142u\u017C\u0105cym do zbierania hase\u0142 i innych poufnych danych, jak i oprogramowaniem celowo zainstalowanym przez pracodawc\u0119 np. w celu kontrolowania aktywno\u015Bci pracownik\u00F3w."@pl , "\u952E\u76D8\u76D1\u542C\uFF0C\u53C8\u7A31\u9375\u76E4\u5074\u9304\uFF0C\u662F\u6307\u5728\u4F7F\u7528\u952E\u76D8\u7684\u4EBA\u4E0D\u77E5\u60C5\u7684\u60C5\u51B5\u4E0B\uFF0C\u901A\u8FC7\u9690\u853D\u7684\u65B9\u5F0F\u8BB0\u5F55\u4E0B\u952E\u76D8\u7684\u6BCF\u4E00\u6B21\u6572\u51FB\u7684\u884C\u4E3A\u3002\u8FDB\u884C\u952E\u76D8\u76D1\u542C\u53EF\u901A\u8FC7\u5404\u79CD\u8F6F\u786C\u4EF6\u624B\u6BB5\u5B9E\u73B0\u3002\u76EE\u524D\u6700\u5E38\u89C1\u7684\u65B9\u6CD5\u4E3A\u5728\u5BA2\u6237\u7535\u8111\u4E0A\u690D\u5165\u6728\u9A6C\u7A0B\u5E8F\u540E\u901A\u8FC7\u5176\u5B9E\u73B0\u952E\u76D8\u76D1\u542C\u3002 \u4E3A\u4E86\u5BF9\u6297\u8F6F\u4EF6\u5C42\u9762\u7684\u653B\u51FB\uFF08\u5982\u952E\u76D8\u94A9\u5B50\uFF09\uFF0C\u4E00\u4E9B\u8F6F\u4EF6\uFF08\u4F8B\u5982\u817E\u8BAFQQ\uFF09\u5728\u7528\u6237\u8F93\u5165\u5BC6\u7801\u7B49\u654F\u611F\u4FE1\u606F\u65F6\u4F1A\u7528\u4E00\u4E2A\u66F4\u5E95\u5C42\u7684\u9A71\u52A8\u7A0B\u5E8F\u622A\u53D6\u952E\u76D8\u8F93\u5165\uFF0C\u4F46\u653B\u51FB\u8005\u4E5F\u53EF\u4EE5\u901A\u8FC7\u9A71\u52A8\u7A0B\u5E8F\u4ECE\u64CD\u4F5C\u7CFB\u7EDF\u5185\u6838\u4E2D\u83B7\u53D6\u672A\u7ECF\u5E72\u6270\u7684\u6309\u952E\u3002 \u901A\u8FC7\u786C\u4EF6\u624B\u6BB5\u5B9E\u73B0\u7684\u952E\u76D8\u76D1\u542C\u4E00\u822C\u5F88\u96BE\u4ECE\u8F6F\u4EF6\u5C42\u9762\u53D1\u73B0\u3002"@zh , "Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware. While the programs themselves are legal, with many designed to allow employers to oversee the use of their computers, keyloggers are most often used for stealing passwords and other confidential information."@en , "Un keylogger, in informatica, \u00E8 uno strumento hardware o software in grado di effettuare la registrazione (logging) della tastiera di un computer, cio\u00E8 \u00E8 in grado di intercettare e catturare segretamente tutto ci\u00F2 che viene digitato sulla tastiera senza che l'utente se ne accorga. Pu\u00F2 essere usato per studiare l\u2019interazione uomo-computer. L'attivit\u00E0 viene definita keystroke logging, keylogging o keyboard capturing."@it , "En informatique, un enregistreur de frappe (en anglais : keylogger) est un p\u00E9riph\u00E9rique qui enregistre \u00E9lectroniquement l'utilisation d'un ordinateur. Inoffensif \u00E0 la base, sa fonction premi\u00E8re est l'enregistrement des \u00E9v\u00E9nements sur le clavier, ces enregistrements peuvent \u00EAtre ensuite utilis\u00E9s volontairement par l'utilisateur, dans le cas des macros ou des raccourcis clavier par exemple."@fr , "Un keylogger (derivado del ingl\u00E9s: key ('tecla') y logger ('registrador'); 'registrador de teclas') es un tipo de software o un dispositivo hardware espec\u00EDfico que se encarga de registrar las pulsaciones que se realizan en el teclado, para posteriormente memorizarlas en un fichero o enviarlas a trav\u00E9s de internet.\u200B Suele usarse como malware del tipo daemon, permitiendo que otros usuarios tengan acceso a contrase\u00F1as importantes, como los n\u00FAmeros de una tarjeta de cr\u00E9dito, u otro tipo de informaci\u00F3n privada que se quiera obtener."@es , "\u0631\u0627\u0635\u062F \u0644\u0648\u062D\u0629 \u0645\u0641\u0627\u062A\u064A\u062D (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: key logger)\u200F \u0623\u0648 \u0623\u062D\u062F \u0628\u0631\u0627\u0645\u062C \u0627\u0644\u062A\u062C\u0633\u0633 \u0647\u0648 \u0628\u0631\u0646\u0627\u0645\u062C \u0645\u062E\u0641\u064A \u064A\u0631\u0633\u0644 \u0639\u0628\u0631 \u0627\u0644\u0627\u064A\u0645\u064A\u0644 \u0623\u0648 \u0623\u0646\u062A \u062A\u0642\u0648\u0645 \u0628\u062A\u062D\u0645\u064A\u0644\u0647 \u0645\u0646 \u0623\u062D\u062F \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u063A\u064A\u0631 \u0627\u0644\u0645\u0648\u062B\u0648\u0642\u0629 \u0623\u0648 \u064A\u0643\u0648\u0646 \u0636\u0645\u0646 \u0627\u0644\u0628\u0631\u0627\u0645\u062C \u0627\u0644\u0645\u062C\u0627\u0646\u064A\u0629 \u0648\u0623\u0646\u062A \u0644\u0627 \u062A\u0639\u0644\u0645 \u0628\u0630\u0644\u0643\u060C \u062D\u064A\u062B \u064A\u0642\u0648\u0645 \u0628\u0631\u0646\u0627\u0645\u062C \u0627\u0644\u062A\u062C\u0633\u0633 \u0628\u0646\u0642\u0644 \u0643\u0627\u0641\u0629 \u0645\u0627 \u064A\u0643\u062A\u0628 \u0628\u0644\u0648\u062D\u0629 \u0627\u0644\u0645\u0641\u0627\u062A\u064A\u062D \u0625\u0644\u0649 \u062C\u0647\u0627\u062A \u0628\u0639\u064A\u062F\u0629 \u0639\u0627\u062F\u0629 \u0625\u0644\u0649 \u0635\u0627\u062D\u0628 \u0627\u0644\u062A\u062C\u0633\u0633 \u0623\u0648 \u0645\u0631\u0633\u0644 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062C\u060C \u0648\u0647\u0630\u0627 \u0647\u0648 \u0623\u062E\u0637\u0631 \u0647\u0630\u0647 \u0627\u0644\u0643\u0627\u0626\u0646\u0627\u062A \u0648\u0627\u0644\u0630\u064A \u064A\u0639\u062F \u0639\u0645\u0644\u0647 \u0623\u0634\u0628\u0647 \u0645\u0627 \u064A\u0643\u0648\u0646 \u0628\u0639\u0645\u0644 \u062D\u0635\u0627\u0646 \u0637\u0631\u0648\u0627\u062F\u0629 \u0623\u062D\u062F \u0623\u0646\u0648\u0627\u0639 \u0641\u064A\u0631\u0648\u0633\u0627\u062A \u0627\u0644\u062A\u062C\u0633\u0633 \u0648\u064A\u0633\u062A\u062E\u062F\u0645 \u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0623\u062C\u0647\u0632\u0629 \u0645\u0639\u064A\u0646\u0629 \u0648\u0645\u0639\u0631\u0641\u0629 \u0645\u0627 \u064A\u0643\u062A\u0628 \u0639\u0644\u064A\u0647\u0627. \u0645\u062B\u0644 \u0623\u0631\u0642\u0627\u0645 \u0627\u0644\u0633\u0631 \u0648\u0643\u0644\u0645\u0627\u062A \u0627\u0644\u062F\u062E\u0648\u0644 \u0623\u0631\u0642\u0627\u0645 \u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0627\u0626\u062A\u0645\u0627\u0646."@ar , "Keylogger (n\u011Bkdy tak\u00E9 Keystroke Logger) je software, kter\u00FD sn\u00EDm\u00E1 stisky jednotliv\u00FDch kl\u00E1ves. Antivirem b\u00FDv\u00E1 pova\u017Eov\u00E1n za virus. V p\u0159\u00EDpad\u011B software se jedn\u00E1 o ur\u010Ditou formu spyware, ale existuj\u00ED i hardwarov\u00E9 keyloggery. Keylogger neohro\u017Euje p\u0159\u00EDmo po\u010D\u00EDta\u010D, ale slou\u017E\u00ED ke zji\u0161\u0165ov\u00E1n\u00ED hesel jin\u00FDch lid\u00ED. N\u011Bkter\u00E9 z nich b\u00FDvaj\u00ED v opera\u010Dn\u00EDm syst\u00E9mu Microsoft Windows proti sv\u00E9mu zni\u010Den\u00ED chr\u00E1n\u011Bny pomoc\u00ED Archivace a Skryt\u00ED soubor\u016F, tak\u017Ee je nen\u00ED mo\u017En\u00E9 pomoc\u00ED Pr\u016Fzkumn\u00EDku naj\u00EDt (je nutn\u00E9 pou\u017E\u00EDt vyhled\u00E1v\u00E1n\u00ED)."@cs , "Keylogging (em portugu\u00EAs, registro de tecla) \u00E9 a a\u00E7\u00E3o de gravar/registrar (logging) as teclas pressionadas em um teclado, normalmente de maneira secreta, para que a pessoa que usa o teclado n\u00E3o saiba que suas a\u00E7\u00F5es est\u00E3o sendo monitoradas. Os dados podem ser recuperados pela pessoa respons\u00E1vel pelo . Um keylogger pode ser implementado por software, hardware ou uma combina\u00E7\u00E3o dos dois. O keylogging tamb\u00E9m pode ser usado para estudar a intera\u00E7\u00E3o homem-computador. Existem v\u00E1rios m\u00E9todos de keylogging: eles v\u00E3o desde abordagens baseadas em hardware e software at\u00E9 an\u00E1lises ac\u00FAsticas."@pt , "\u30AD\u30FC\u30ED\u30AC\u30FC\uFF08Keylogger, \u307E\u305F\u306FKeystroke logging\uFF09\u3068\u306F\u3001\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\uFF08\u30D1\u30FC\u30BD\u30CA\u30EB\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\uFF09\u3078\u306E\u30AD\u30FC\u5165\u529B\u3092\u76E3\u8996\u3057\u3001\u305D\u308C\u3092\u8A18\u9332\u3059\u308B\u30BD\u30D5\u30C8\u30A6\u30A7\u30A2\u3082\u3057\u304F\u306F\u30CF\u30FC\u30C9\u30A6\u30A7\u30A2\u3067\u3042\u308B\u3002"@ja , "Keylogger \u2014 (\u0430\u043D\u0433\u043B. key(stroke) \u2014 \u043A\u043B\u0430\u0432\u0456\u0448\u0430 \u043D\u0430 \u0430\u043D\u0433\u043B. logger \u2014 \u0440\u0435\u0454\u0441\u0442\u0440\u0443\u044E\u0447\u0438\u0439 \u043F\u0440\u0438\u0441\u0442\u0440\u0456\u0439) \u2014 \u0446\u0435 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043D\u0438\u0439 \u043F\u0440\u043E\u0434\u0443\u043A\u0442 (\u043C\u043E\u0434\u0443\u043B\u044C) \u0430\u0431\u043E \u0430\u043F\u0430\u0440\u0430\u0442\u043D\u0438\u0439 \u043F\u0440\u0438\u0441\u0442\u0440\u0456\u0439, \u0449\u043E \u0440\u0435\u0454\u0441\u0442\u0440\u0443\u0454 \u043A\u043E\u0436\u043D\u0435 \u043D\u0430\u0442\u0438\u0441\u043D\u0435\u043D\u043D\u044F \u043D\u0430 \u043A\u043B\u0430\u0432\u0456\u0448\u0443 \u043A\u043B\u0430\u0432\u0456\u0430\u0442\u0443\u0440\u0438 \u043A\u043E\u043C\u043F'\u044E\u0442\u0435\u0440\u0430."@uk , "Perekam ketikan merupakan sebuah perangkat baik perangkat keras atau perangkat lunak yang digunakan untuk memantau penekanan tombol papan ketik. Sebuah perekam ketikan biasanya akan menyimpan hasil pemantauan penekanan tombol papan ketik tersebut ke dalam sebuah berkas catatan (log file). Beberapa perekam ketikan tertentu bahkan dapat mengirimkan hasil rekamannya ke surel tertentu secara berkala."@in , "Ein Keylogger (dt. \u201ETasten-Protokollierer\u201C) ist eine Hard- oder Software, die dazu verwendet wird, die Eingaben des Benutzers an der Tastatur eines Computers zu protokollieren und damit zu \u00FCberwachen oder zu rekonstruieren. Keylogger werden beispielsweise von Crackern, Nachrichtendiensten oder Ermittlungsbeh\u00F6rden verwendet, um an vertrauliche Daten \u2013 etwa Kennw\u00F6rter oder PINs \u2013 zu gelangen. Ein Keylogger kann entweder s\u00E4mtliche Eingaben aufzeichnen oder gezielt auf Schl\u00FCsselw\u00F6rter wie z. B. Zugangscodes warten und dann erst aufzeichnen, um Speicherplatz zu sparen."@de , "Keylogger \u00E4r en typ av datorprogramvara eller h\u00E5rdvara med vars hj\u00E4lp man kan registrera (logga) tangenttryckningar p\u00E5 en dator. Keyloggern registrerar alla knappar som trycks ned och kan p\u00E5 s\u00E5 vis till exempel f\u00E5 reda p\u00E5 l\u00F6senord. Syftet \u00E4r ofta att stj\u00E4la viktig information, som till exempel l\u00F6senord, av datoranv\u00E4ndare. Keyloggers installeras oftast p\u00E5 en dator med hj\u00E4lp av en fj\u00E4rrstyrd trojansk h\u00E4st. Keyloggers kan installeras genom att man installerar n\u00E5got, till exempel ett spel eller programvara, och Keyloggern installeras utan att man m\u00E4rker n\u00E5got."@sv , "\u041A\u0435\u0439\u043B\u043E\u0301\u0433\u0435\u0440, \u043A\u0435\u0439\u043B\u043E\u0301\u0433\u0433\u0435\u0440 (\u0430\u043D\u0433\u043B. keylogger, \u043F\u0440\u0430\u0432\u0438\u043B\u044C\u043D\u043E \u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044F \u00AB\u043A\u0438-\u043B\u043E\u0301\u0433\u0433\u0435\u0440\u00BB \u2014 \u043E\u0442 \u0430\u043D\u0433\u043B. key \u2014 \u043A\u043B\u0430\u0432\u0438\u0448\u0430 \u0438 logger \u2014 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u0443\u044E\u0449\u0435\u0435 \u0443\u0441\u0442\u0440\u043E\u0439\u0441\u0442\u0432\u043E) \u2014 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u043D\u043E\u0435 \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u0435 \u0438\u043B\u0438 \u0430\u043F\u043F\u0430\u0440\u0430\u0442\u043D\u043E\u0435 \u0443\u0441\u0442\u0440\u043E\u0439\u0441\u0442\u0432\u043E, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u0443\u044E\u0449\u0435\u0435 \u0440\u0430\u0437\u043B\u0438\u0447\u043D\u044B\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044F \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u044F \u2014 \u043D\u0430\u0436\u0430\u0442\u0438\u044F \u043A\u043B\u0430\u0432\u0438\u0448 \u043D\u0430 \u043A\u043B\u0430\u0432\u0438\u0430\u0442\u0443\u0440\u0435 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430, \u0434\u0432\u0438\u0436\u0435\u043D\u0438\u044F \u0438 \u043D\u0430\u0436\u0430\u0442\u0438\u044F \u043A\u043B\u0430\u0432\u0438\u0448 \u043C\u044B\u0448\u0438 \u0438 \u0442. \u0434."@ru ; foaf:depiction , , , . @prefix dcterms: . @prefix dbc: . dbr:Keystroke_logging dcterms:subject dbc:Surveillance , dbc:Security_breaches , dbc:Cybercrime , dbc:Cryptographic_attacks , dbc:Spyware ; dbo:abstract "Keylogger \u00E4r en typ av datorprogramvara eller h\u00E5rdvara med vars hj\u00E4lp man kan registrera (logga) tangenttryckningar p\u00E5 en dator. Keyloggern registrerar alla knappar som trycks ned och kan p\u00E5 s\u00E5 vis till exempel f\u00E5 reda p\u00E5 l\u00F6senord. Syftet \u00E4r ofta att stj\u00E4la viktig information, som till exempel l\u00F6senord, av datoranv\u00E4ndare. Keyloggers installeras oftast p\u00E5 en dator med hj\u00E4lp av en fj\u00E4rrstyrd trojansk h\u00E4st. Keyloggers kan installeras genom att man installerar n\u00E5got, till exempel ett spel eller programvara, och Keyloggern installeras utan att man m\u00E4rker n\u00E5got."@sv , "Keylogger (ingelesetik: \"Key\" tekla eta \"Logger\" erregistratzailea; teklen erregistratzailea). Teklatuan egiten diren pultsazioak erregistratzeaz arduratzen den software mota bat da. Erabiltzaileen kontu korrontea, kreditu txartelaren zenbakia, pasahitzak eta horrelako datu pribatu eta garrantzitsuak biltzeko erabiltzen da, besteak beste."@eu , "Keylogging (em portugu\u00EAs, registro de tecla) \u00E9 a a\u00E7\u00E3o de gravar/registrar (logging) as teclas pressionadas em um teclado, normalmente de maneira secreta, para que a pessoa que usa o teclado n\u00E3o saiba que suas a\u00E7\u00F5es est\u00E3o sendo monitoradas. Os dados podem ser recuperados pela pessoa respons\u00E1vel pelo . Um keylogger pode ser implementado por software, hardware ou uma combina\u00E7\u00E3o dos dois. Apesar dos programas, propriamente ditos, serem legais, com muitos deles sendo projetados para permitir que os empregadores supervisionem o uso de seus computadores, os keyloggers costumam ser usados para roubar senhas e outras informa\u00E7\u00F5es confidenciais. O keylogging tamb\u00E9m pode ser usado para estudar a intera\u00E7\u00E3o homem-computador. Existem v\u00E1rios m\u00E9todos de keylogging: eles v\u00E3o desde abordagens baseadas em hardware e software at\u00E9 an\u00E1lises ac\u00FAsticas."@pt , "Keylogger (ang. key \u201Eklawisz\u201D, logger \u201Erejestrator\u201D) \u2013 rodzaj oprogramowania lub urz\u0105dzenia rejestruj\u0105cego klawisze naciskane przez u\u017Cytkownika. Na og\u00F3\u0142 s\u0105 spotykane w wersji programowej, rzadziej w sprz\u0119towej. Keylogger mo\u017Ce by\u0107 zar\u00F3wno szkodliwym oprogramowaniem s\u0142u\u017C\u0105cym do zbierania hase\u0142 i innych poufnych danych, jak i oprogramowaniem celowo zainstalowanym przez pracodawc\u0119 np. w celu kontrolowania aktywno\u015Bci pracownik\u00F3w."@pl , "Un keylogger (derivado del ingl\u00E9s: key ('tecla') y logger ('registrador'); 'registrador de teclas') es un tipo de software o un dispositivo hardware espec\u00EDfico que se encarga de registrar las pulsaciones que se realizan en el teclado, para posteriormente memorizarlas en un fichero o enviarlas a trav\u00E9s de internet.\u200B Suele usarse como malware del tipo daemon, permitiendo que otros usuarios tengan acceso a contrase\u00F1as importantes, como los n\u00FAmeros de una tarjeta de cr\u00E9dito, u otro tipo de informaci\u00F3n privada que se quiera obtener. El registro de lo que se teclea puede hacerse tanto con medios de hardware como de software. Los sistemas comerciales disponibles incluyen dispositivos que pueden conectarse al cable del teclado (lo que los hace inmediatamente disponibles pero visibles si un usuario revisa el teclado) y al teclado mismo (que no se ven pero que se necesita alg\u00FAn conocimiento de como soldarlos para instalarlos en el teclado). Escribir aplicaciones para realizar keylogging es trivial y, como cualquier programa computacional, puede ser distribuido a trav\u00E9s de un troyano o como parte de un virus inform\u00E1tico o gusano inform\u00E1tico. Incluso puede alterar las b\u00FAsquedas en Google, creando b\u00FAsquedas inexistentes y otras p\u00E1ginas adicionales. Se suele descargar comprimido para eludir antivirus. Se dice que se puede utilizar un teclado virtual para evitar esto, ya que s\u00F3lo requiere clics del rat\u00F3n. Sin embargo, las aplicaciones m\u00E1s nuevas tambi\u00E9n registran screenshots (capturas de pantalla) al realizarse un clic, que anulan la seguridad de esta medida."@es , "\u952E\u76D8\u76D1\u542C\uFF0C\u53C8\u7A31\u9375\u76E4\u5074\u9304\uFF0C\u662F\u6307\u5728\u4F7F\u7528\u952E\u76D8\u7684\u4EBA\u4E0D\u77E5\u60C5\u7684\u60C5\u51B5\u4E0B\uFF0C\u901A\u8FC7\u9690\u853D\u7684\u65B9\u5F0F\u8BB0\u5F55\u4E0B\u952E\u76D8\u7684\u6BCF\u4E00\u6B21\u6572\u51FB\u7684\u884C\u4E3A\u3002\u8FDB\u884C\u952E\u76D8\u76D1\u542C\u53EF\u901A\u8FC7\u5404\u79CD\u8F6F\u786C\u4EF6\u624B\u6BB5\u5B9E\u73B0\u3002\u76EE\u524D\u6700\u5E38\u89C1\u7684\u65B9\u6CD5\u4E3A\u5728\u5BA2\u6237\u7535\u8111\u4E0A\u690D\u5165\u6728\u9A6C\u7A0B\u5E8F\u540E\u901A\u8FC7\u5176\u5B9E\u73B0\u952E\u76D8\u76D1\u542C\u3002 \u4E3A\u4E86\u5BF9\u6297\u8F6F\u4EF6\u5C42\u9762\u7684\u653B\u51FB\uFF08\u5982\u952E\u76D8\u94A9\u5B50\uFF09\uFF0C\u4E00\u4E9B\u8F6F\u4EF6\uFF08\u4F8B\u5982\u817E\u8BAFQQ\uFF09\u5728\u7528\u6237\u8F93\u5165\u5BC6\u7801\u7B49\u654F\u611F\u4FE1\u606F\u65F6\u4F1A\u7528\u4E00\u4E2A\u66F4\u5E95\u5C42\u7684\u9A71\u52A8\u7A0B\u5E8F\u622A\u53D6\u952E\u76D8\u8F93\u5165\uFF0C\u4F46\u653B\u51FB\u8005\u4E5F\u53EF\u4EE5\u901A\u8FC7\u9A71\u52A8\u7A0B\u5E8F\u4ECE\u64CD\u4F5C\u7CFB\u7EDF\u5185\u6838\u4E2D\u83B7\u53D6\u672A\u7ECF\u5E72\u6270\u7684\u6309\u952E\u3002 \u901A\u8FC7\u786C\u4EF6\u624B\u6BB5\u5B9E\u73B0\u7684\u952E\u76D8\u76D1\u542C\u4E00\u822C\u5F88\u96BE\u4ECE\u8F6F\u4EF6\u5C42\u9762\u53D1\u73B0\u3002"@zh , "\u0397 \u03BA\u03B1\u03C4\u03B1\u03B3\u03C1\u03B1\u03C6\u03AE \u03C4\u03B7\u03C2 \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B7\u03C3\u03B7\u03C2, \u03C0\u03BF\u03C5 \u03C3\u03C5\u03C7\u03BD\u03AC \u03B1\u03BD\u03B1\u03C6\u03AD\u03C1\u03B5\u03C4\u03B1\u03B9 \u03C9\u03C2 keylogging \u03AE keyboard capturing, \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B7 \u03B4\u03C1\u03AC\u03C3\u03B7 \u03C4\u03B7\u03C2 \u03BA\u03B1\u03C4\u03B1\u03B3\u03C1\u03B1\u03C6\u03AE\u03C2 \u03C4\u03C9\u03BD \u03C0\u03BB\u03AE\u03BA\u03C4\u03C1\u03C9\u03BD \u03C0\u03BF\u03C5 \u03C0\u03B1\u03C4\u03AE\u03B8\u03B7\u03BA\u03B1\u03BD \u03C3\u03B5 \u03AD\u03BD\u03B1 \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B9\u03BF, \u03C3\u03C5\u03BD\u03AE\u03B8\u03C9\u03C2 \u03BA\u03C1\u03C5\u03C6\u03AC, \u03AD\u03C4\u03C3\u03B9 \u03CE\u03C3\u03C4\u03B5 \u03C4\u03BF \u03AC\u03C4\u03BF\u03BC\u03BF \u03C0\u03BF\u03C5 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03B5\u03AF \u03C4\u03BF \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B9\u03BF \u03BD\u03B1 \u03BC\u03B7\u03BD \u03B3\u03BD\u03C9\u03C1\u03AF\u03B6\u03B5\u03B9 \u03CC\u03C4\u03B9 \u03BF\u03B9 \u03B5\u03BD\u03AD\u03C1\u03B3\u03B5\u03B9\u03AD\u03C2 \u03C4\u03BF\u03C5 \u03C0\u03B1\u03C1\u03B1\u03BA\u03BF\u03BB\u03BF\u03C5\u03B8\u03BF\u03CD\u03BD\u03C4\u03B1\u03B9. \u0397 \u03BA\u03B1\u03C4\u03B1\u03B3\u03C1\u03B1\u03C6\u03AE \u03C4\u03B7\u03C2 \u03C0\u03BB\u03B7\u03BA\u03C4\u03C1\u03BF\u03BB\u03CC\u03B3\u03B7\u03C3\u03B7\u03C2 (Keylogging) \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03B5\u03C0\u03AF\u03C3\u03B7\u03C2 \u03BD\u03B1 \u03C7\u03C1\u03B7\u03C3\u03B9\u03BC\u03BF\u03C0\u03BF\u03B9\u03B7\u03B8\u03B5\u03AF \u03B3\u03B9\u03B1 \u03C4\u03B7 \u03BC\u03B5\u03BB\u03AD\u03C4\u03B7 \u03C4\u03B7\u03C2 \u03B1\u03BB\u03BB\u03B7\u03BB\u03B5\u03C0\u03AF\u03B4\u03C1\u03B1\u03C3\u03B7\u03C2 \u03B1\u03BD\u03B8\u03C1\u03CE\u03C0\u03BF\u03C5\u2013\u03C5\u03C0\u03BF\u03BB\u03BF\u03B3\u03B9\u03C3\u03C4\u03AE. \u03A5\u03C0\u03AC\u03C1\u03C7\u03BF\u03C5\u03BD \u03C0\u03BF\u03BB\u03BB\u03AD\u03C2 \u03BC\u03AD\u03B8\u03BF\u03B4\u03BF\u03B9 keylogging, \u03BF\u03B9 \u03BF\u03C0\u03BF\u03AF\u03B5\u03C2 \u03BC\u03C0\u03BF\u03C1\u03B5\u03AF \u03BD\u03B1 \u03B5\u03AF\u03BD\u03B1\u03B9 \u03B2\u03B1\u03C3\u03B9\u03C3\u03BC\u03AD\u03BD\u03B5\u03C2 \u03C3\u03C4\u03BF \u03C5\u03BB\u03B9\u03BA\u03CC (hardware) \u03BA\u03B1\u03B9 \u03C4\u03BF \u03BB\u03BF\u03B3\u03B9\u03C3\u03BC\u03B9\u03BA\u03CC (software) \u03C4\u03BF\u03C5 \u03C5\u03C0\u03BF\u03BB\u03BF\u03B3\u03B9\u03C3\u03C4\u03AE \u03AE \u03B1\u03BA\u03CC\u03BC\u03B1 \u03BA\u03B1\u03B9 \u03BD\u03B1 \u03C3\u03C4\u03B7\u03C1\u03AF\u03B6\u03BF\u03BD\u03C4\u03B1\u03B9 \u03C3\u03C4\u03B7\u03BD \u03B1\u03BA\u03BF\u03C5\u03C3\u03C4\u03B9\u03BA\u03AE \u03B1\u03BD\u03AC\u03BB\u03C5\u03C3\u03B7."@el , "Un keylogger (derivat de l'angl\u00E8s: key ('tecla') i logger ('registrador'); 'registrador de tecles') \u00E9s un tipus de programari o un dispositiu maquinari espec\u00EDfic que s'encarrega de registrar les pulsacions que es fan al teclat per, posteriorment, memoritzar-les en un fitxer o enviar-les a trav\u00E9s d'internet."@ca , "Un keylogger, in informatica, \u00E8 uno strumento hardware o software in grado di effettuare la registrazione (logging) della tastiera di un computer, cio\u00E8 \u00E8 in grado di intercettare e catturare segretamente tutto ci\u00F2 che viene digitato sulla tastiera senza che l'utente se ne accorga. Pu\u00F2 essere usato per studiare l\u2019interazione uomo-computer. L'attivit\u00E0 viene definita keystroke logging, keylogging o keyboard capturing."@it , "Keylogger (n\u011Bkdy tak\u00E9 Keystroke Logger) je software, kter\u00FD sn\u00EDm\u00E1 stisky jednotliv\u00FDch kl\u00E1ves. Antivirem b\u00FDv\u00E1 pova\u017Eov\u00E1n za virus. V p\u0159\u00EDpad\u011B software se jedn\u00E1 o ur\u010Ditou formu spyware, ale existuj\u00ED i hardwarov\u00E9 keyloggery. Keylogger neohro\u017Euje p\u0159\u00EDmo po\u010D\u00EDta\u010D, ale slou\u017E\u00ED ke zji\u0161\u0165ov\u00E1n\u00ED hesel jin\u00FDch lid\u00ED. N\u011Bkter\u00E9 z nich b\u00FDvaj\u00ED v opera\u010Dn\u00EDm syst\u00E9mu Microsoft Windows proti sv\u00E9mu zni\u010Den\u00ED chr\u00E1n\u011Bny pomoc\u00ED Archivace a Skryt\u00ED soubor\u016F, tak\u017Ee je nen\u00ED mo\u017En\u00E9 pomoc\u00ED Pr\u016Fzkumn\u00EDku naj\u00EDt (je nutn\u00E9 pou\u017E\u00EDt vyhled\u00E1v\u00E1n\u00ED). Existuj\u00ED i takov\u00E9, kter\u00FDch si antivirus nev\u0161imne a kter\u00E9 nejdou odinstalovat (Trial verze Elite keyloggeru), tak\u017Ee je nutn\u00E9 je jednodu\u0161e smazat (ov\u0161em ani to nemus\u00ED fungovat v\u017Edy).[zdroj?]"@cs , "En informatique, un enregistreur de frappe (en anglais : keylogger) est un p\u00E9riph\u00E9rique qui enregistre \u00E9lectroniquement l'utilisation d'un ordinateur. Inoffensif \u00E0 la base, sa fonction premi\u00E8re est l'enregistrement des \u00E9v\u00E9nements sur le clavier, ces enregistrements peuvent \u00EAtre ensuite utilis\u00E9s volontairement par l'utilisateur, dans le cas des macros ou des raccourcis clavier par exemple. Les utilisations de cet outil sont potentiellement vari\u00E9es : il peut par exemple enregistrer les touches saisies au clavier, r\u00E9aliser des captures d'\u00E9cran, ou lister les actions de l'utilisateur et les applications actives. Le terme keylogger est parfois utilis\u00E9 pour parler de l'enregistrement des p\u00E9riph\u00E9riques d'entr\u00E9e/sortie, bien que ces dispositifs puissent \u00EAtre nomm\u00E9s sp\u00E9cifiquement en fonction du p\u00E9riph\u00E9rique vis\u00E9, comme les mouseloggers pour la souris."@fr , "Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored. Data can then be retrieved by the person operating the logging program. A keystroke recorder or keylogger can be either software or hardware. While the programs themselves are legal, with many designed to allow employers to oversee the use of their computers, keyloggers are most often used for stealing passwords and other confidential information. Keylogging can also be used to study keystroke dynamics or human-computer interaction. Numerous keylogging methods exist, ranging from hardware and software-based approaches to acoustic cryptanalysis."@en , "\u0631\u0627\u0635\u062F \u0644\u0648\u062D\u0629 \u0645\u0641\u0627\u062A\u064A\u062D (\u0628\u0627\u0644\u0625\u0646\u062C\u0644\u064A\u0632\u064A\u0629: key logger)\u200F \u0623\u0648 \u0623\u062D\u062F \u0628\u0631\u0627\u0645\u062C \u0627\u0644\u062A\u062C\u0633\u0633 \u0647\u0648 \u0628\u0631\u0646\u0627\u0645\u062C \u0645\u062E\u0641\u064A \u064A\u0631\u0633\u0644 \u0639\u0628\u0631 \u0627\u0644\u0627\u064A\u0645\u064A\u0644 \u0623\u0648 \u0623\u0646\u062A \u062A\u0642\u0648\u0645 \u0628\u062A\u062D\u0645\u064A\u0644\u0647 \u0645\u0646 \u0623\u062D\u062F \u0627\u0644\u0645\u0648\u0627\u0642\u0639 \u063A\u064A\u0631 \u0627\u0644\u0645\u0648\u062B\u0648\u0642\u0629 \u0623\u0648 \u064A\u0643\u0648\u0646 \u0636\u0645\u0646 \u0627\u0644\u0628\u0631\u0627\u0645\u062C \u0627\u0644\u0645\u062C\u0627\u0646\u064A\u0629 \u0648\u0623\u0646\u062A \u0644\u0627 \u062A\u0639\u0644\u0645 \u0628\u0630\u0644\u0643\u060C \u062D\u064A\u062B \u064A\u0642\u0648\u0645 \u0628\u0631\u0646\u0627\u0645\u062C \u0627\u0644\u062A\u062C\u0633\u0633 \u0628\u0646\u0642\u0644 \u0643\u0627\u0641\u0629 \u0645\u0627 \u064A\u0643\u062A\u0628 \u0628\u0644\u0648\u062D\u0629 \u0627\u0644\u0645\u0641\u0627\u062A\u064A\u062D \u0625\u0644\u0649 \u062C\u0647\u0627\u062A \u0628\u0639\u064A\u062F\u0629 \u0639\u0627\u062F\u0629 \u0625\u0644\u0649 \u0635\u0627\u062D\u0628 \u0627\u0644\u062A\u062C\u0633\u0633 \u0623\u0648 \u0645\u0631\u0633\u0644 \u0627\u0644\u0628\u0631\u0646\u0627\u0645\u062C\u060C \u0648\u0647\u0630\u0627 \u0647\u0648 \u0623\u062E\u0637\u0631 \u0647\u0630\u0647 \u0627\u0644\u0643\u0627\u0626\u0646\u0627\u062A \u0648\u0627\u0644\u0630\u064A \u064A\u0639\u062F \u0639\u0645\u0644\u0647 \u0623\u0634\u0628\u0647 \u0645\u0627 \u064A\u0643\u0648\u0646 \u0628\u0639\u0645\u0644 \u062D\u0635\u0627\u0646 \u0637\u0631\u0648\u0627\u062F\u0629 \u0623\u062D\u062F \u0623\u0646\u0648\u0627\u0639 \u0641\u064A\u0631\u0648\u0633\u0627\u062A \u0627\u0644\u062A\u062C\u0633\u0633 \u0648\u064A\u0633\u062A\u062E\u062F\u0645 \u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0623\u062C\u0647\u0632\u0629 \u0645\u0639\u064A\u0646\u0629 \u0648\u0645\u0639\u0631\u0641\u0629 \u0645\u0627 \u064A\u0643\u062A\u0628 \u0639\u0644\u064A\u0647\u0627. \u0645\u062B\u0644 \u0623\u0631\u0642\u0627\u0645 \u0627\u0644\u0633\u0631 \u0648\u0643\u0644\u0645\u0627\u062A \u0627\u0644\u062F\u062E\u0648\u0644 \u0623\u0631\u0642\u0627\u0645 \u0628\u0637\u0627\u0642\u0627\u062A \u0627\u0644\u0627\u0626\u062A\u0645\u0627\u0646."@ar , "Keylogger \u2014 (\u0430\u043D\u0433\u043B. key(stroke) \u2014 \u043A\u043B\u0430\u0432\u0456\u0448\u0430 \u043D\u0430 \u0430\u043D\u0433\u043B. logger \u2014 \u0440\u0435\u0454\u0441\u0442\u0440\u0443\u044E\u0447\u0438\u0439 \u043F\u0440\u0438\u0441\u0442\u0440\u0456\u0439) \u2014 \u0446\u0435 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043D\u0438\u0439 \u043F\u0440\u043E\u0434\u0443\u043A\u0442 (\u043C\u043E\u0434\u0443\u043B\u044C) \u0430\u0431\u043E \u0430\u043F\u0430\u0440\u0430\u0442\u043D\u0438\u0439 \u043F\u0440\u0438\u0441\u0442\u0440\u0456\u0439, \u0449\u043E \u0440\u0435\u0454\u0441\u0442\u0440\u0443\u0454 \u043A\u043E\u0436\u043D\u0435 \u043D\u0430\u0442\u0438\u0441\u043D\u0435\u043D\u043D\u044F \u043D\u0430 \u043A\u043B\u0430\u0432\u0456\u0448\u0443 \u043A\u043B\u0430\u0432\u0456\u0430\u0442\u0443\u0440\u0438 \u043A\u043E\u043C\u043F'\u044E\u0442\u0435\u0440\u0430."@uk , "Ein Keylogger (dt. \u201ETasten-Protokollierer\u201C) ist eine Hard- oder Software, die dazu verwendet wird, die Eingaben des Benutzers an der Tastatur eines Computers zu protokollieren und damit zu \u00FCberwachen oder zu rekonstruieren. Keylogger werden beispielsweise von Crackern, Nachrichtendiensten oder Ermittlungsbeh\u00F6rden verwendet, um an vertrauliche Daten \u2013 etwa Kennw\u00F6rter oder PINs \u2013 zu gelangen. Ein Keylogger kann entweder s\u00E4mtliche Eingaben aufzeichnen oder gezielt auf Schl\u00FCsselw\u00F6rter wie z. B. Zugangscodes warten und dann erst aufzeichnen, um Speicherplatz zu sparen."@de , "\u041A\u0435\u0439\u043B\u043E\u0301\u0433\u0435\u0440, \u043A\u0435\u0439\u043B\u043E\u0301\u0433\u0433\u0435\u0440 (\u0430\u043D\u0433\u043B. keylogger, \u043F\u0440\u0430\u0432\u0438\u043B\u044C\u043D\u043E \u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044F \u00AB\u043A\u0438-\u043B\u043E\u0301\u0433\u0433\u0435\u0440\u00BB \u2014 \u043E\u0442 \u0430\u043D\u0433\u043B. key \u2014 \u043A\u043B\u0430\u0432\u0438\u0448\u0430 \u0438 logger \u2014 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u0443\u044E\u0449\u0435\u0435 \u0443\u0441\u0442\u0440\u043E\u0439\u0441\u0442\u0432\u043E) \u2014 \u043F\u0440\u043E\u0433\u0440\u0430\u043C\u043C\u043D\u043E\u0435 \u043E\u0431\u0435\u0441\u043F\u0435\u0447\u0435\u043D\u0438\u0435 \u0438\u043B\u0438 \u0430\u043F\u043F\u0430\u0440\u0430\u0442\u043D\u043E\u0435 \u0443\u0441\u0442\u0440\u043E\u0439\u0441\u0442\u0432\u043E, \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u0443\u044E\u0449\u0435\u0435 \u0440\u0430\u0437\u043B\u0438\u0447\u043D\u044B\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044F \u043F\u043E\u043B\u044C\u0437\u043E\u0432\u0430\u0442\u0435\u043B\u044F \u2014 \u043D\u0430\u0436\u0430\u0442\u0438\u044F \u043A\u043B\u0430\u0432\u0438\u0448 \u043D\u0430 \u043A\u043B\u0430\u0432\u0438\u0430\u0442\u0443\u0440\u0435 \u043A\u043E\u043C\u043F\u044C\u044E\u0442\u0435\u0440\u0430, \u0434\u0432\u0438\u0436\u0435\u043D\u0438\u044F \u0438 \u043D\u0430\u0436\u0430\u0442\u0438\u044F \u043A\u043B\u0430\u0432\u0438\u0448 \u043C\u044B\u0448\u0438 \u0438 \u0442. \u0434."@ru , "Perekam ketikan merupakan sebuah perangkat baik perangkat keras atau perangkat lunak yang digunakan untuk memantau penekanan tombol papan ketik. Sebuah perekam ketikan biasanya akan menyimpan hasil pemantauan penekanan tombol papan ketik tersebut ke dalam sebuah berkas catatan (log file). Beberapa perekam ketikan tertentu bahkan dapat mengirimkan hasil rekamannya ke surel tertentu secara berkala. Perekam ketikan dapat digunakan untuk kepentingan yang baik atau bahkan bisa digunakan untuk kepentingan yang jahat. Kepentingan yang baik antara lain untuk memantau produktivitas karyawan, untuk penegakan hukum dan pencarian bukti kejahatan. Kepentingan yang buruk antara lain pencurian data dan password. Perekam ketikan yang berupa perangkat keras besarnya seukuran baterai ukuran AA. Perekam ketikan jenis ini dipasangkan pada ujung papan ketik, sehingga mencegat data yang dialirkan dari perekam ketikan ke CPU. Sementara itu, perekam ketikan dalam bentuk perangkat lunak terpasang di dalam komputer dan bekerja secara tersembunyi. Cara sederhana untuk menghindari dampak adanya perekam ketikan pada sistem operasi Microsoft Windows adalah dengan menggunakan fitur (osk.exe).https://www.facebook.com/mdhimas.mr.96"@in , "\u30AD\u30FC\u30ED\u30AC\u30FC\uFF08Keylogger, \u307E\u305F\u306FKeystroke logging\uFF09\u3068\u306F\u3001\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\uFF08\u30D1\u30FC\u30BD\u30CA\u30EB\u30B3\u30F3\u30D4\u30E5\u30FC\u30BF\uFF09\u3078\u306E\u30AD\u30FC\u5165\u529B\u3092\u76E3\u8996\u3057\u3001\u305D\u308C\u3092\u8A18\u9332\u3059\u308B\u30BD\u30D5\u30C8\u30A6\u30A7\u30A2\u3082\u3057\u304F\u306F\u30CF\u30FC\u30C9\u30A6\u30A7\u30A2\u3067\u3042\u308B\u3002"@ja , "Een keylogger is een programma of een stuk hardware waarmee men de toetsaanslagen tot zelfs de muisbewegingen van een computergebruiker kan registreren."@nl , "\uD0A4\uB85C\uAE45(Keylogging, \uD0A4 \uC2A4\uD2B8\uB85C\uD06C \uB85C\uAE45(Keystroke logging)\uC73C\uB85C\uB3C4 \uBD88\uB9BC)\uC740 \uC0AC\uC6A9\uC790\uAC00 \uD0A4\uBCF4\uB4DC\uB85C PC\uC5D0 \uC785\uB825\uD558\uB294 \uB0B4\uC6A9\uC744 \uBAB0\uB798 \uAC00\uB85C\uCC44\uC5B4 \uAE30\uB85D\uD558\uB294 \uD589\uC704\uB97C \uB9D0\uD55C\uB2E4. \uD558\uB4DC\uC6E8\uC5B4, \uC18C\uD504\uD2B8\uC6E8\uC5B4\uB97C \uD65C\uC6A9\uD55C \uBC29\uBC95\uC5D0\uC11C\uBD80\uD130 \uC804\uC790\uC801, \uC74C\uD5A5\uAE30\uC220\uC744 \uD65C\uC6A9\uD55C \uAE30\uBC95\uAE4C\uC9C0 \uB2E4\uC591\uD55C \uD0A4\uB85C\uAE45 \uBC29\uBC95\uC774 \uC874\uC7AC\uD55C\uB2E4."@ko ; dbo:wikiPageWikiLink dbr:Session_replay , dbr:Reverse_connection , dbc:Surveillance , dbr:Universal_Serial_Bus , dbr:Firmware , , dbr:HTTP_Secure , dbr:Public_key , dbr:Computer_keyboard , , dbr:Computer_surveillance , dbr:Subroutine , , dbc:Spyware , dbr:Pretty_Good_Privacy , dbr:Hooking , dbr:Network_monitoring , dbr:Mouse_gestures , dbr:SpyEye_trojan , , , , dbr:Supply_chain_attack , , dbr:Cryptotrojan , dbr:GGXLog , , , dbr:Inputlog , dbr:Virtual_keyboard , dbr:Perry_Kivolowitz , dbr:Acoustic_cryptanalysis , dbr:Windows_10 , dbr:Instant_messenger , dbr:Web_browser , dbr:Man-in-the-browser , dbr:Brute-force_attack , dbr:Packet_analyzer , dbr:Usenet , dbr:User-mode , dbr:Anti-keylogger , dbr:Live_CD , dbr:Replay_attack , dbr:Microsoft , dbr:Context_menu , dbr:Automated_teller_machine , dbr:Form_grabbing , dbr:Speech_recognition , , dbr:Microsoft_Windows , dbr:Gyroscope , dbr:Nicodemo_Scarfo , dbr:Federal_Bureau_of_Investigation , , dbr:Personal_identification_number , , dbr:Proxy_server , dbr:Web_tracking , dbr:Hypervisor , , dbr:Device_driver , dbr:Malware , dbc:Cryptographic_attacks , dbr:Heuristics , dbr:Virtual_machine , dbr:Cybercriminal , dbr:GUI_widget , dbr:Web_search_query , dbr:Unix , dbr:Steganography , , dbr:Rootkit , , dbr:Form_filler , dbr:BIOS , dbr:Electromagnetic_radiation , dbr:Tablet_computer , dbr:Software , dbr:Statistics , dbr:Email_address , dbc:Security_breaches , dbr:Information_technology , dbr:Live_USB , dbr:Graphics_tablet , dbr:Card_reader , , dbr:Personal_digital_assistant , dbr:Spyware , dbr:Soviet_Union , dbr:Moscow , dbr:Data_in_transit , dbr:Man-in-the-middle_attack , dbr:Computer_worm , dbr:Cross-site_scripting , , dbr:Electromagnetic_shielding , dbr:Anti-spyware , , dbr:Russia , dbr:Wireless , dbr:Smart_card , dbr:Computer_virus , dbr:Digital_footprint , dbr:Transport_Layer_Security , dbr:Frequency_analysis , dbr:IP_address , dbr:Primary_storage , dbr:Black-bag_cryptanalysis , dbc:Cybercrime , dbr:Passphrase , dbr:Superuser , dbr:Light_pen , dbr:Classified_information , , dbr:Accelerometer , dbr:Typewriter , dbr:Confidential_information , dbr:Computer_hardware , dbr:Anechoic_chamber , dbr:Phoning_home , dbr:Selectric , dbr:Keystroke_dynamics , dbr:Surveillance_camera , dbr:Ciphertext , , dbr:Screenshot , dbr:Hardware_keylogger , dbr:Application_programming_interface , dbr:Touchscreen , dbr:Credit_card , dbr:Windows_XP , dbr:File_Transfer_Protocol , dbr:One-time_password , dbr:Security_token , dbr:Cryptanalysis . @prefix dbt: . dbr:Keystroke_logging dbp:wikiPageUsesTemplate dbt:Short_description , dbt:When , dbt:Clarify_timeframe , dbt:Clarify , dbt:Curlie , dbt:Commons_category-inline , dbt:Information_security , dbt:Reflist , dbt:Main , dbt:Malware , dbt:Convert ; dbo:thumbnail ; dbo:wikiPageRevisionID 1115860127 . @prefix xsd: . dbr:Keystroke_logging dbo:wikiPageLength "44189"^^xsd:nonNegativeInteger ; dbo:wikiPageID 57829 . @prefix owl: . @prefix dbpedia-eu: . dbr:Keystroke_logging owl:sameAs dbpedia-eu:Keylogger . @prefix dbpedia-ro: . dbr:Keystroke_logging owl:sameAs dbpedia-ro:Keylogger , . @prefix dbpedia-pl: . dbr:Keystroke_logging owl:sameAs dbpedia-pl:Keylogger . @prefix dbpedia-az: . dbr:Keystroke_logging owl:sameAs dbpedia-az:Keylogger . @prefix dbpedia-cs: . dbr:Keystroke_logging owl:sameAs dbpedia-cs:Keylogger , . @prefix dbpedia-nl: . dbr:Keystroke_logging owl:sameAs dbpedia-nl:Keylogger . @prefix dbpedia-it: . dbr:Keystroke_logging owl:sameAs dbpedia-it:Keylogger . @prefix dbpedia-simple: . dbr:Keystroke_logging owl:sameAs dbpedia-simple:Keystroke_logging , , . @prefix dbpedia-de: . dbr:Keystroke_logging owl:sameAs dbpedia-de:Keylogger , , , , . @prefix wikidata: . dbr:Keystroke_logging owl:sameAs wikidata:Q309396 . @prefix dbpedia-sk: . dbr:Keystroke_logging owl:sameAs dbpedia-sk:Keylogger , . @prefix dbpedia-sv: . dbr:Keystroke_logging owl:sameAs dbpedia-sv:Keylogger . @prefix dbpedia-da: . dbr:Keystroke_logging owl:sameAs dbpedia-da:Keylogger . @prefix dbpedia-no: . dbr:Keystroke_logging owl:sameAs dbpedia-no:Keylogger . @prefix dbpedia-lmo: . dbr:Keystroke_logging owl:sameAs dbpedia-lmo:Keylogger . @prefix dbpedia-uk: . dbr:Keystroke_logging owl:sameAs dbpedia-uk:Keylogger . @prefix dbpedia-id: . dbr:Keystroke_logging owl:sameAs dbpedia-id:Perekam_ketikan . @prefix yago-res: . dbr:Keystroke_logging owl:sameAs yago-res:Keystroke_logging . @prefix dbpedia-vi: . dbr:Keystroke_logging owl:sameAs dbpedia-vi:Keylogger , , dbr:Keystroke_logging . @prefix dbpedia-pt: . dbr:Keystroke_logging owl:sameAs dbpedia-pt:Keylogger , , , . @prefix dbpedia-et: . dbr:Keystroke_logging owl:sameAs dbpedia-et:Klahvinuhk . @prefix dbpedia-tr: . dbr:Keystroke_logging owl:sameAs dbpedia-tr:Klavye_dinleme_sistemi , . @prefix dbpedia-es: . dbr:Keystroke_logging owl:sameAs dbpedia-es:Keylogger . @prefix dbpedia-gl: . dbr:Keystroke_logging owl:sameAs dbpedia-gl:Keylogger , . @prefix dbpedia-ca: . dbr:Keystroke_logging owl:sameAs dbpedia-ca:Keylogger . @prefix dbpedia-fr: . dbr:Keystroke_logging owl:sameAs dbpedia-fr:Enregistreur_de_frappe . @prefix gold: . dbr:Keystroke_logging gold:hypernym dbr:Action . @prefix prov: . dbr:Keystroke_logging prov:wasDerivedFrom ; foaf:isPrimaryTopicOf wikipedia-en:Keystroke_logging ; dbp:date "November 2017"@en , "January 2021"@en ; dbp:reason "Sentence is not grammatically sensible."@en . dbr:Rootkit dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Point-of-sale_malware dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Retina-X_Studios dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:NProtect_GameGuard dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Comparison_of_privilege_authorization_features dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Hardware_keylogger dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Tinfoil_Hat_Linux dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Computer_keyboard dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:GoGuardian dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Keystroke_dynamics dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Key_logger dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Timeline_of_computer_viruses_and_worms dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Bailey_Turner dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Internet_Explorer_6 dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Keyboard_technology dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:LinkNYC dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:End_node_problem dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Secure_communication dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Virtual_keyboard dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Trusteer dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Key_logging dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Keylogger dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Click_path dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Computer_security dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:List_of_government_mass_surveillance_projects dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Hacking_Team dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Global_surveillance dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Tamper-evident_technology dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Crime_prevention dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Keyloggers dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:KeePass dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Trend_Micro_Internet_Security dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Browser_Helper_Object dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Privilege_escalation dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Cybersecurity_information_technology_list dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:VeraCrypt dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Password_strength dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Censorship_in_the_United_States dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Anti-keylogger dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Time_Doctor dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Host-based_intrusion_detection_system dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Cyber_self-defense dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Session_replay dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:PunkeyPOS_Malware dbo:wikiPageWikiLink dbr:Keystroke_logging . dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Pretty_Good_Privacy dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:WebWatcher dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Interactive_kiosk dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Computer_surveillance_in_the_workplace dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Form_grabbing dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Eavesdropping dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Vidoop dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:SpyEye dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbp:subtype dbr:Keystroke_logging . dbr:Rocket_Kitten dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Mebroot dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Human_rights_and_encryption dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Pegasus_Project_revelations_in_India dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Interdiction dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Terry_Cutler dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Inputlog dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Greynet dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Partial_password dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:MacScan dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:WhatPulse dbo:wikiPageWikiLink dbr:Keystroke_logging . dbr:Keystroke_logger dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Key_loggers dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Keyboard_capturing dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Keyboard_logger dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Keyboard_monitor dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Keyboard_watcher dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Keylogging dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging . dbr:Anti-Keylogging dbo:wikiPageWikiLink dbr:Keystroke_logging ; dbo:wikiPageRedirects dbr:Keystroke_logging .