| 1. | These keystroke loggers have built - in memory chips that can capture a year or more of typing 这些击键记录者有可捕获一年或更多的输入的内置内存芯片。 |
| 2. | While there ' s no available software to detect hardware keystroke loggers , you can take steps to defend your systems 尽管不存在检测硬件击键记录者的软件,你可以采取以下步骤来保卫系统。 |
| 3. | Keystroke loggers are a particularly dangerous security threat because users typically don ' t realize they ' re even there 击键记录者是特别危险的安全威胁,因为他们即使存在,用户通常也没有察觉到。 |
| 4. | Some companies actually sell keyboards with built - in keystroke loggers , which means there ' s no way to visually detect them 一些公司实际上销售带内置击键记录者的键盘,这意味者无法从外观上检测他们。 |
| 5. | Even worse , nothing can detect a hardware keystroke logger , which can capture usernames and passwords as you log into your machine 更糟的是,无法检测一个硬件击键记录者,它可以在你登录机器时捕获用户名和密码。 |
| 6. | Learn about the different versions of keystroke loggers , and get tips for protecting your organization and your users from this threat 来了解一下击键记录者的不同版本,并获取一些保护组织机构和用户免受此威胁的小贴士罢。 |
| 7. | These keystroke loggers are physical devices that sit between the keyboard and the computer ? connecting the keyboard with the keyboard port on the computer 这些击键记录者是位于键盘和计算机之间的特殊设备? ?用计算机键盘接口连接键盘。 |
| 8. | Let ' s look at the different versions of keystroke loggers and discuss what you can do to protect your organization and your users from this threat 让我们看看击键记录者的不同版本,并讨论你可以采取什么措施来保护组织机构和用户免受此威胁罢。 |
| 9. | Keystroke loggers are available in either software or hardware versions . they can store everything a user types without the user ever knowing they ' re even there 击键记录者有软件或硬件版本。它们可以在用户不知其存在的情况下保存用户输入的一切。 |
| 10. | Physical access to the hardware allows users to bypass software checks by installing keyloggers , taking away hard drives and reading them in other machines , sniffing network traffic , and so on 通过安装击键记录器( keyloggers ) 、取走硬盘驱动器并在其他机器中读取、嗅探网络传输等等,对硬件物理上的访问可以让用户绕过软件检查。 |