It's sort of hard to give you ``undocumented features'' when you don't specify what the target OS is. If for windows, you can probably make a really rudimentary keyhook using the SetWindowsHookEx api, with a Dll which injects itself to all running processes, also using the same api.
Name:
Anonymous2007-07-31 7:05 ID:M4l57nL+
You'd be better off asking at http://www.rootkit.com/, or just browsing the articles. Also, check out the source for BO2K.
Name:
Anonymous2007-07-31 9:54 ID:UZ3eWnqG
>>7
If whoever he's trying to log would notice a keylogger that isn't embedded with a rootkit, what makes you think they wouldn't notice a mysterious object sticking out of their keyboard?
Name:
Anonymous2007-07-31 9:57 ID:Vgx/nFJ1
>>1 OKAY YOU FUQIN ANGERED AN EXPERT PROGRAMMER
GODFUCKIGNDAMN
FIRST OF ALL, YOU DONT FUQIN KNOW WHAT A MAN PAGE IS
SECONDLY, THIS IS /prog/ DO NOT DEMAND USEFUL ANSWERS THE WAY YOU WANT THEM TO BE
THIRDLY PROGRAMMING IS ALL ABOUT PHILOSOPHY AND ``ABSTRACT BULLSHITE'' THAT YOU WILL NEVER COMPREHEND
AND FUQIN LASTLY, FUCK OFF WITH YOUR BULLSHYT
EVERYTHING HAS ALREADY BEEN ANSWERED IN>>7,9 and >>10
Name:
Anonymous2007-07-31 14:42 ID:VGD7B2lt
>>11
It fits around the PS/2 connection, and it is the same shape.
Trivia: When the Mafia started encrypting their records with PGP, the FBI couldn't crack the coded files, so they put keyloggers in the computers to get the keys.
Name:
Anonymous2009-02-25 6:18
Rootkit Give me some suggestions for undocumented.
Name:
Anonymous2009-03-06 8:48
Cross-site scripting right Though it fails on some pages I will hax your anus tonight and make a mess of your computer You will lose a possible job offer over it and stop bawwing.
Name:
Trollbot90002009-07-01 10:32
Smart PEOPLE AND WOULD like to support client objectives and.