logo

COMPUTER SECURITY.

   

Added on  2023-04-07

7 Pages407 Words207 Views
Running head: COMPUTER SECURITY
Computer Security
Name of the Student
Name of the University
Author’s Note

1
COMPUTER SECURITY
Table of Contents
Explanation of the keylogger code.............................................................................................2
Modification of the code............................................................................................................3
Screenshot..................................................................................................................................3
a. Running the keylogger & File log created......................................................................3
b. Email Sent and received..................................................................................................4
Bibliography...............................................................................................................................6

2
COMPUTER SECURITY
Explanation of the keylogger code
For listening the mouse event pynput module is needed to be installed and for the
installation pip install pynput command is used in cmd. The installation is checked by using
the command import pynput in the python IDE. For the development of keylogger the key
and listener is imported from the logging module and pynput.keyboard. In the next step a
variable is set that is used for pointing the logs where they are saved. This is leaved as empty
for saving the log at the same directory of the python script. The next command is used for
setting the logging module and then the keypress is defined for taking the key as a parameter.
The type of the key is casted into a string for storing in the log. An instance is setup in the
next step and the on_press method is defined using a statement and it is joined with the main
thread.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Network Security: Routers, Switches, Firewall, Potential Issues and Solutions
|8
|530
|103