If you want to provide reliable authentication, given that the user
has a keystroke logger installed, you may simply use a visual keyboard
written in Java.

regards,
Gustavo

2005/12/1, Shannon Johnston <[EMAIL PROTECTED]>:
> Hi All,
> I'm looking for input on what you all believe the most common keystroke
> loggers are. I've been challenged to write an authentication method (for
> a web site) that can be secure while using a compromised system.
>
> Thanks,
> Shannon
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
>
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Reply via email to