2. See the keylogger file - it must not contain the text you have typed.
看到键盘记录程序文件-它必须不包含文字,你还有打字。
来自互联网
3. Use your keyboard to type any text while Keylogger Hunter is running.
用你的键盘键入任何文字,而键盘记录程序猎人运行。
来自互联网
4. Some keylogger programs can even record occasional pictures or video of the screen.
有一些键盘记录器甚至可以记录下你偶尔打开的图片或者视频。
来自互联网
5. Disable keylogger Hunter and type any text again - it will appear in the keylogger file.
禁用键盘记录程序亨特和任何类型的文本再次-它将出现在键盘记录程序文件。
来自互联网
6. When used for the wrong reasons, Perfect Keylogger can put your financial and personal data at risk.
时使用了错误的原因,Perfect Keylogger程序可以把你的财务和风险的个人资料。
来自互联网
7. Hook based keylogger is the most prevailing type of keyloggers, since this method is very easy-to-realize.
钩基于键盘记录程序是最普遍的类型的按键记录程序,因为这种方法很容易到实现的。
来自互联网
8. If you suspect a keylogger is on your PC, update your antivirus software of choice and give it a full run.
如果你怀疑你的电脑上有键盘记录器,更新你的反病毒软件的病毒库,并且把它完整的运行一遍。
来自互联网
9. The result of such process is an empty file of the keylogger, which by no means can contain data about pressed keys.
结果,这个过程是一个空文件的键盘记录软件,它决不是可以包含数据压键。
来自互联网
10. A keylogger recorder can record instant messages, E-mail, and any information you type at any time using your keyboard.
键登录器记录仪能记录即时信息、电子邮件以及你在任何时候利用键盘敲入的任何信息。
来自互联网
11. Master Keystroke logger is a keylogger which allows you to find out what other people are doing on your computer when you are gone.
大师是一个键盘记录击键记录器可让您了解其他人在您的计算机时,你走干什么。
来自互联网
12. A keylogger is a malicious program that tracks keystrokes on the victim's computer to illegally capture the user's personal data, such as passwords.
键盘记录器是一种恶意程序,跟踪击键在受害者的电脑,非法获取用户的个人数据,如密码。
来自互联网
13. If it succeeds, the attack will download a Trojan with a keylogger component that many anti-virus software packages do not yet identify, according to Websense.
成功的话,攻击者会下载一个键盘记录木马的组成部分,许多反病毒软件还没有确定。
来自互联网
14. This Trojan includes a keylogger and allows attackers to access your computer, stealing passwords and personal data. It is a registered security risk and should be removed immediately.
该木马包括键盘记录功能,并允许攻击者访问你的计算机,窃取密码和个人数据。
来自互联网
15. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.
16. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.