home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The World of Computer Software
/
The World of Computer Software.iso
/
tsrbt.zip
/
KEYLOG.TXT
< prev
next >
Wrap
Text File
|
1991-07-10
|
4KB
|
61 lines
█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█
█▀█▀█▀▀█▀▀█▀▀▀█▀▀▀█▀▀▀ H O R I Z O N S ▀▀▀▀█▀▀▀█▀▀▀█▀▀█▀▀█▀█▀█
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ Consulting ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
≡ 1432 E. Commercial Street ─ Springfield, MO 65803 ≡
≡ Phone: (417) 839-2174 - Fax: (417) 831-1329 ≡
▒▒▄ ▒▒▒▄ ─────── presents ───────
▒▒█ ▒▒█▀▀ tm
▒▒█ ▒▒█▀ ▒▒▒▒▒▒▄ ▒▒▄ ▒▒▄ ▒▒▄ ▒▒▒▒▒▒▄ ▒▒▒▒▒▒▒▄
▒▒▒▒▒█▀ ▒▒█▀▀▀▀ ▒▒█ ▒▒█ ▒▒█ ▒▒█▀▒▒█ ▒▒█▀▀▀▀
▒▒█▀▒▒▄ ▒▒▒▒▄ ▒▒▒▒▒▒█ ▒▒█ ▒▒█ ▒▒█ ▒▒█ ▒▒▒▄
▒▒█ ▒▒▄ ▒▒█▀▀ ▀▒▒█▀▀ ▒▒█ ▒▒█ ▒▒█ ▒▒█ ▒▒█
▒▒█ ▒▒▒▄ ▒▒▒▒▒▒▄ ▒▒█ ▒▒▒▒▒▒▄ ▒▒▒▒▒▒█ ▒▒▒▒▒▒▒█
▀▀ ▀▀▀ ▀▀▀▀▀▀ ▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀ ▀▀▀▀▀▀▀
─────────────────────────────────────────────────────────────────
≡ A User Support and Management Utility - Copyright (C) 1991 ≡
─────────────────────────────────────────────────────────────────
Quite frequently system administrators and data processing
managers are frustrated with having to support user problems that
are complicated by users who are not sure exactly what they did
prior to experiencing difficulty. KeyLog is a program designed
to help eliminate the problem of not knowing exactly what keys
the operator had pressed.
KeyLog works by monitoring and logging to a disk file every
keystroke a user presses. This way a DP manager can address a
problem more directly by seeing exactly what keys a user had
pressed before the potential problem occurred.
KeyLog also timestamps all keyboard activities in it's log
file. This simplifies the problem of determining what screen
prompts were present when a user pressed specific keys.
Requiring less than 1K, KeyLog can be configured to load
automatically during an autoexec or network login script to be
completely transparent to the user. Security measures must be
taken when doing so as KeyLog will record login passwords, and
other application passwords and codes that represent a potential
security risk. However, when installed covertly, KeyLog can be a
useful tool to identify the individuals involved when security
breaches are a problem.
KeyLog was developed by a system administrator who was
swamped by a great variety of user support problems, by keeping
track of exactly what the users were doing, he reduced his time
spent addressing user confusion by half. If you are charged with
the responsibility of overseeing many users, KeyLog is a tool
that will make your life easier and much less frustrating.
─────────────────────────────────────────────────────────────────
KeyLog may be ordered by sending $25 to:
█▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀█
█▀█▀█▀▀█▀▀█▀▀▀█▀▀▀█▀▀▀ H O R I Z O N S ▀▀▀▀█▀▀▀█▀▀▀█▀▀█▀▀█▀█▀█
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ Consulting ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
≡ 1432 E. Commercial Street ─ Springfield, MO 65803 ≡
≡ Phone: (417) 839-2174 - Fax: (417) 831-1329 ≡
─────────────────────────────────────────────────────────────────