A software program or a hardware device which captures keystrokes on the computer for later retrieval. They can be used as a way to track computer use, or to steal passwords and other personal information. They can work like a Trojan Horse, capturing data and then sending it back to the person who wrote the program.
A software or hardware that is designed to record everyting you type on your computer keyboard. Some spyware programs secretly install key loggers on users' computer system to capture account number, passwords and other financial information.
(Keystroke Logger). A program that runs in the background, recording all the keystrokes. Once keystrokes are logged, they are hidden in the machine for later retrieval, or shipped raw to the attacker. The attacker then peruses them carefully in the hopes of either finding passwords, or possibly other useful information that could be used to compromise the system or be used in a social engineering attack. For example, a key logger will reveal the contents of all e-mail composed by the user. Keylog programs are commonly included in rootkits and RATs (remote administration trojans).
Also known as a keystroke logger, a Key Logger is a program that records user's keystrokes with the intention of capturing sensitive information such as login information and credit card details. If you use an online banking service these Key Logger programs could be used to record your account number and password to gain access to your bank account. The logged files are e-mailed to the person who planted the logging software.