27.06.2013 Views

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

Hack Security Pro.pdf - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

The first thing to do is to create a password in order to limit the use <strong>of</strong> the s<strong>of</strong>tware to the one<br />

authorized person. This information will be used to authenticate the log reader. The s<strong>of</strong>tware's options<br />

can then make Keylogger invisible. They also <strong>of</strong>fer a measure <strong>of</strong> control on the following points:<br />

– Keylogger is stealth-like (this charges automatically when starting),<br />

– It discriminates on the applications to be spied on (all by default),<br />

– There is a delay between each screenshot (one every 10 minutes by default).<br />

The s<strong>of</strong>tware's logs then become consultable after entering the password.<br />

The <strong>Hack</strong>ademy DMP -177/209- SYSDREAM

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!