If you want to provide reliable authentication, given that the user has a keystroke logger installed, you may simply use a visual keyboard written in Java.
regards, Gustavo 2005/12/1, Shannon Johnston <[EMAIL PROTECTED]>: > Hi All, > I'm looking for input on what you all believe the most common keystroke > loggers are. I've been challenged to write an authentication method (for > a web site) that can be secure while using a compromised system. > > Thanks, > Shannon > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
