Knowledge

Talk:Keystroke logging

Source đź“ť

804:
how and when a security token would most assuredly prevent a keylogging based attack from succeeding, is complex and falls outside of the scope of this article. Here is what I mean by a tamper-proof system: A security token which uses an integrated circuit to implement a challange response system, lets say, crypto-hash based. Assume the crypto and its implementation in the token are strong. The authentication server authenticates a user using two-factor authentication: the token and a password. Assume the authentication server is not compromised. The user authenticates using a terminal/reader that is not secure. While an attacker might learn the password, the attacker can not log or otherwise fake having the token: the token must be in the reader for the user to authenticate, even if the reader itself is hacked. So here is what is certain: when the authentication server sends a challange and recieves the correct response, the correct security token was present. It does not, of course, itself prevent a hacker from then commandeering the session. Nor does it prevent said hacker from obtaining the token in some other way, but now we are discussing basically rubber-hose cryptanalysis. I digress...
1315: 808:
keylogger, will have also had the oportunity to (and may very well have) installed a full remote access backdoor or any number of other things also mentioned in the related features section. This is already mentioned in the current article, but I think it is central to helping a reader understand the issue. Another thing to stress is that discussion of keyloggers, as important as that discussion is to computer security, is of limited value outside of the context of a broader understanding of basic computer security issues, but without becoming a computer security primer itself.
1630: 596: 1604: 489: 278: 251: 346: 429: 402: 370: 1272: 986:
to create a new keyboard layout doesn't change e.g. Windows default shortcuts (i.e. you may swap the C and K keys, and pressing C would result in typing K, but still, Ctrl+C would operate as usual (becoming Ctrl+K), even though that is not the case if you changed the layout to Dvorak in language settings) - I'm guessing the information about keys pressed remains the same, but new values are assigned while typing text. --
220: 527: 799:
or security background one narrow topic, such as keyloggers, without digressing into much broader topics. Nevertheless, that is what this article should ideally accomplish, while avoiding giving or reinforcing misconceptions too much. We could say, for example, "no system is tamper proof" and leave it at that, since in the first place it is the
1704:
Maybe that's the point, something embarrassing like that would be captured by a key logger too. Pretty harmless IMO. If it really bothers you, you could edit the images or or create better screenshots yourself. Or try your luck at removing it entirely. But you shouldn't require other volunteers to do
1008:
Keyboards are quite difficult for most people to use if the letters printed on the keys do not match the letters that appear onscreen - this would be a serious usability problem. If the actual lettering on the keys changes (ie somebody swaps in AZERTY keyboard hardware), that might in principle cause
1004:
Keyboard maps are normally handled at an OS level. Some keyloggers may be fooled by using an alternate keymap; it depends on where they "listen". (To simplify: does the keylogger collect information about keypresses before or after Windows accounts for localisation or any other keymap changes made by
985:
I'm just wondering if this could be mentioned (although I have no idea if it actually works) - wouldn't using a customised keyboard layout (i.e. producing one with MS Keyboard Layout Creator for Windows systems) mess up the recording for at least some keyloggers? Strangely enough, using that software
758:
Socrates2008, I agree the link about the keyloggers installed in smart card (credit card) is relevant and interesting. However I am afraid that it could be confusing for readers without a significant discussion on why these smart cards, in this application, are vulnerable to keylogging whereas other
658:
WP does not give advice. What if your CD-based OS has a keylogger installed too, e.g. via a security flaw that allows infection via an IP port? What about hardware keyloggers (in BIOS, keyboard), acoustic keylogging etc? There's no simple solution if the attacker is determined and has had physical
642:
The article should mention that you can totally avoid ANY software malware inside a computer by cold booting from a LiveCD, such as Ubuntu or Knoppix. Any software on the internal hard drive is completely bypassed. You can boot with a LiveCD and use the Internet. You can store data and programs on
1012:
As an aside, the latter can be a real problem for preboot encryption - as users may often need to type in credentials at a point where the OS isn't available to perform key-mapping magic, the preboot software's understanding of keypresses may differ significantly from the letters actually printed on
870:
knowing the keystrokes, mouse actions, display, clipboard etc at a compromised computer or device will not allow an attacker gain access to a protected resource on an uncompromised server. Security tokens that work as a type of hardware assisted one time password system will share the advantages of
1055:
Yes, the bash shell, for example keeps a shell history. Many older computer systems logged keystrokes to a separate storage device, and were capable of rebuilding a days transactions from the keystroke logs and an overnight backup. (I had the dubious pleasure of running this software on a GEAC 8000
798:
It can be "tamper proof" for all practical purposes (even paranoid ones), but only in a narrowed context. (Also note I self-applied the citation needed tag, since I/we can't just take my word for it.) At the same time I'm agreeing with you; its difficult to educate to a reader without a technical
822:
Agree with all your comments, but would just like to add that in countries like the UK, credit cards with an embedded smartcard still have a legacy magstripe. So while it's no longer possible to make a credit card purchase in the UK with a magstripe, in fact UK cardholders' credit cards revert to
807:
The article might be due for a sweeping overhaul. If I get a good idea for a better way to organize it, I'll post here for feedback. One thing to stress might be the fact that, an attacker who gains access to the system such as superuser or kernel-mode, in order to install/infect with a software
803:
thing to assume and, in a certain sense, it is true that no system which can be interacted with is "Truly Secure" with a capital T. At the same time, the statement is not entirely accurate, there is in fact such a thing as certainty in an uncertain world. The problem is, explaining to the reader
1039:
Are keyloggers ever used for legitimate purposes? I want to install one on my own computer to help me find which sequences of keystrokes I use the most often, so that I can write keyboard shortcuts for them. Just counting word frequencies won't work, because it wouldn't distinguish between text I
910:
I think you're on the right track - need some more refs though. Also in the last sentence, I understand poor security in the manufacturing chain was one of the big issues, as this allowed the tampering to go unnoticed. So how about: "In one instance, poor security in the manufacturing and supply
884:
entry may be vulnerable to keystoke logging. In one instance, criminals were able to use a hardware-based logger within European credit card readers. The resource being protected was permitted by the design of the system to be read by from the token unencrypted, allowing the attack to succeed.
714:
One countermeasure not mentioned is keystroke encryption, such as that provided by QFX KeyScrambler. A custom keyboard driver is used to encrypt keystrokes, which are then decrypted within the target application (eg by a browser extension). Theoretically this should defeat most software-based
875:
within the integrated circuitry can improve security in a similar fashion. However, the effectiveness of a system based on security tokens at improving security in the face of a keylogging attack is variable and depends on the type of system, its implementation, and what is being protected.
1718:
Every875, I do not see the problem here. The words nude girls and playboy.com are not inappropriate, they are just words. If you feel strongly enough about them you can create new images to be used or look through commons to see if there is a different set of images that can be used.
759:
types of security tokens, used in another context, may me highly or completely resistant to this sort of attack (by rendering it irrelevant). I also apologize for not following suggested procedure by moving the link to the discussion page and explaining why it was removed.
1123:"Every software keylogger can log these typed characters sent from one program to another." Not sure this is true, if the typed characters are windows messages, and the keylogger is trapping hardware interrupts. Perhaps someone with the necessary knowledge can clarify. 823:
the old method when used in other countries. In other words, criminals capture the PIN and read the card in the UK, then use the details elsewhere. So as usual, while the underlying PKI technology itself is bullet-proof, the implementation is flawed.
1770:
I had put playboy in the tab on purpose to show how embarrassing keyloggers can be. This image is intended to show that keyloggers can be used to detect illegal or unwanted activities, but can also be used to break confidentiality and privacy.
638:
Most simple software- or hardware-based keylogging can be effectively thwarted by getting into the habit of NEVER typing any of your passwords in proper order. While you type any password, use the mouse to move around within the password.
1143:
On a modern OS, only a kernel mode logger (implemented as a driver) can trap keystrokes at the hardware level (Ring 0). Most usermode loggers hook the message queue or simply poll the OS for keypress via the GetAsyncKeyState() API.
1599:
If you take a careful look at the first image in the page, where the browser tabs are shown, you can see that an inappropriate tab titled "nude girls" is open. Should that image be replaced? This is very disturbing....
911:
chain allowed criminals to subvert European credit card readers with a hardware-based logger. Poor design of the system allowed credit card details to be intercepted after they had been decrypted by the card reader."
730:
Yes keystroke encryption is definitely useful against certain types of keylogger. What I'm unsure about is whether something like KeyScrambler would work if installed on a computer that already has a keylogger on it.
153: 1735:
It looks as though the creator of the images forgot to close the tab before taking the screenshot. If that tab was open on purpose to show how embarrassing keyloggers can be, this should be included in the caption.
1174:
Should there be a section about the legality of keylogging, in particular, the restrictions and prohibitions certain governments have placed, maybe discussions about whether it may violate wiretap laws?
1075:
Keylogging is the technology used for auto-correct ("teh" becomes "the" in Microsoft Word) and text-expansion functionality (typing "tyvm" becomes "thank you very much"); so yes, it has legitimate uses.
1509: 1864: 1523: 1403: 1882: 1878: 1541: 1537: 1421: 1417: 1013:
the keys, in an international organisation where different people have different localised keyboards. This tends to manifest as hundreds of cases for a helpdesk which start "
2046: 2026: 147: 379: 1303: 479: 1176: 1009:
problems for keylogging at a lower level - ie hardware keylogging - but in practice an attacker installing a hardware keylogger may well notice the alternate keyboard.
991: 1796: 1087: 774:
That's fine - do you have any suggestions as to how this can be improved or reworded? The scam made headline news, and illustrates that no system is tamper proof.
1510:
https://web.archive.org/web/20131221071647/http://themoscownews.com/russia/20130711/191758523/Russian-security-agency-to-buy-typewriters-to-avoid-surveillance.html
1235: 1226: 1203: 742: 699: 648: 558: 901: 813: 764: 679: 1257: 2006: 1513: 1083: 1222: 1199: 753: 1499: 715:
keyloggers, since they will get only the encrypted keystrokes. Perhaps this could be added as a new heading alongside 'Keystore interference software'?
336: 2041: 2021: 1262: 716: 703: 469: 384: 1307: 1940:
One of the images of keylogging under application has a secondary open tab that says "Nude girls". I think an updated image would be a better fit.
709: 768: 1850: 1163: 1041: 724: 1941: 1780: 1800: 1221:
The table shows keyloggers compared one to another by multiple of functionalities. The results shown in table seems to be easy to understand.
673: 1785:
I liked Notimes images better because it is more modern. I feel like the two current images are dated. Also rip that man for being blocked.
1067: 1028: 746: 930: 905: 842: 817: 793: 1338: 1110: 1095: 445: 1765: 1134: 2036: 2016: 1930: 1589: 1207: 1991: 995: 643:
USB flash drives under your control. When you turn off the computer, there will be no trace of anything you did inside the computer. -
503: 326: 79: 1692: 1664: 1469: 2001: 1955: 1935: 360: 44: 1860:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
1751: 1742: 1723: 1519:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
1399:
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
1389: 1713: 1641: 1615: 2051: 1189: 516: 436: 407: 1949: 1184: 168: 1369: 1118: 135: 1594: 1299: 85: 987: 980: 302: 1986: 1792: 1091: 958: 1514:
http://themoscownews.com/russia/20130711/191758523/Russian-security-agency-to-buy-typewriters-to-avoid-surveillance.html
1996: 1959: 738: 695: 644: 30: 1825: 1500:
https://web.archive.org/web/20090826150015/http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed
1474: 872: 1842: 1747:
Ok, what do you want? If it bothers you so much, make new screenshots. I do not see the problem with the images.
1491: 1361: 1230: 1049: 1379: 609: 190: 129: 567:
Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
2031: 1971: 1344: 498: 412: 285: 256: 99: 1881:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
1540:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
1420:
to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the
2011: 1217:
I suggest adding the link to comparison table of most popular commercial monitoring products on keylogger.org:
866:
may improve security in some ways even when an unauthorized keylogger (or related) is present. In particular,
652: 355: 261: 104: 20: 1851:
https://web.archive.org/web/20080913072014/http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
1503: 125: 1180: 74: 1925: 1679: 1584: 1464: 1333: 231: 175: 65: 1900:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
1559:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
1439:
If you have discovered URLs which were erroneously considered dead by the bot, you can report them with
1841:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit 1490:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit 1360:. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit 1253: 185: 1854: 1246:
Perhaps adding information on the more recent developments of keystroke logging would be recommended.
1128: 1061: 1218: 1761: 1169: 541: 1101:
That's not keylogging. Naturally a program reads your keystrokes in order to know what is wanted.
444:
on Knowledge. If you would like to participate, please visit the project page, where you can join
301:
on Knowledge. If you would like to participate, please visit the project page, where you can join
1916: 1575: 1455: 1390:
https://web.archive.org/web/20100626093658/http://networkintercept.com/keystrokeinterference.html
1278: 1034: 109: 1885:
before doing mass systematic removals. This message is updated dynamically through the template
1544:
before doing mass systematic removals. This message is updated dynamically through the template
1424:
before doing mass systematic removals. This message is updated dynamically through the template
1240:
Some external links needed in order for people who are looking for example keylogging software.
1901: 1838: 1560: 1487: 1440: 1156: 923: 835: 786: 665: 298: 141: 1888: 1776: 1547: 1427: 1249: 720: 237: 1370:
https://web.archive.org/web/20131207133350/http://www.spywareloop.com/news/keystroke-logging
896:
Ideally, there would be a short article dedicated to this incident and we'd just link there.
1908: 1788: 1567: 1447: 1125: 1079: 1058: 734: 691: 8: 1757: 1393: 1212: 1024: 219: 55: 1967: 1867:, "External links modified" talk page sections are no longer generated or monitored by 1526:, "External links modified" talk page sections are no longer generated or monitored by 1406:, "External links modified" talk page sections are no longer generated or monitored by 1106: 1045: 70: 1907:
If you found an error with any archives or the URLs themselves, you can fix them with
1566:
If you found an error with any archives or the URLs themselves, you can fix them with
1446:
If you found an error with any archives or the URLs themselves, you can fix them with
570:
Find editors who have shown interest in this subject and ask them to take a look here.
1945: 1834: 1629: 1483: 1353: 1001:
I moved your comment to the bottom of the page, per convention - hope you don't mind.
536: 441: 51: 24: 1373: 1772: 1748: 1720: 1686:
help me? This is getting really suspicious! Not a single person has replied to me!
1673: 1603: 1327: 161: 1710: 1357: 897: 809: 760: 1380:
https://web.archive.org/web/20110429181147/http://spyreveal.com/keyloggerremoval
1653: 1020: 863: 633: 1873:. No special action is required regarding these talk page notices, other than 1532:. No special action is required regarding these talk page notices, other than 1412:. No special action is required regarding these talk page notices, other than 618: 199: 1980: 1963: 1738: 1699: 1688: 1660: 1637: 1611: 1102: 622: 595: 203: 1015:
I'm sure I'm typing in the right password, but it keeps on locking me out...
1504:
http://www.digitalsociety.org/2009/08/apple-keyboards-hacked-and-possessed/
962: 1756:
I replaced the images with my own since the previous images were dated. --
1874: 1730: 1669: 1533: 1413: 1322: 877: 859: 1962:. I am sure that it we had an equivalent image, then we would use that. 1383: 1195: 1005:
the user? I know which I'd choose if I were writing keylogger software).
624: 204: 1706: 1056:
when the overnight crashed and the backups had been incorrectly made.)
488: 1040:
typed and text I downloaded. It also wouldn't get command sequences.
294: 1194:
Reference # 15, namely "Keylogger Removal" link is no more active -
1855:
http://www.ivizsecurity.com/research/preboot/preboot_whitepaper.pdf
620: 369: 345: 290: 277: 250: 201: 685: 428: 401: 1219:
http://www.keylogger.org/monitoring-software-review/tableview.htm
1623:
Update: the second image features "playboy.com" at the bottom:
625: 205: 526: 1845:
for additional information. I made the following changes:
1494:
for additional information. I made the following changes:
1364:
for additional information. I made the following changes:
1266: 1243:
Also links needed to anti-keylogging software are needed.
959:"Organized crime tampers with European card swipe devices" 881: 1394:
http://networkintercept.com/keystrokeinterference.html
160: 2047:
C-Class Computer Security articles of Low-importance
2027:
C-Class Computer hardware articles of Low-importance
589: 440:, a collaborative effort to improve the coverage of 289:, a collaborative effort to improve the coverage of 15: 1877:using the archive tool instructions below. Editors 1536:using the archive tool instructions below. Editors 1416:using the archive tool instructions below. Editors 548:Review importance and quality of existing articles 1374:http://www.spywareloop.com/news/keystroke-logging 1978: 1236:Links to software based keystroke logging needed 871:OTP, and others which implement a cryptographic 551:Identify categories related to Computer Security 33:for general discussion of the article's subject. 1863:This message was posted before February 2018. 1522:This message was posted before February 2018. 1402:This message was posted before February 2018. 680:comparison of keylogger avoidance technologies 956: 174: 688:would be truly benefitial to this article. 2007:C-Class software articles of Low-importance 754:Smart-Card Vulnerability to logging attacks 1958:appears to be the only example of that in 1833:I have just modified one external link on 1263:Semi-protected edit request on 25 May 2016 557:Identify articles for creation (see also: 2042:Low-importance Computer Security articles 2022:Low-importance Computer hardware articles 1956:File:Keylogger-screen-capture-example.png 1482:I have just modified 2 external links on 1352:I have just modified 3 external links on 539:. Please allow some days for processing. 1628: 1602: 710:Keystroke encryption as a countermeasure 1658:Can you help me? No one is responding! 454:Knowledge:WikiProject Computer Security 217: 1979: 1936:Application of keylogger image example 457:Template:WikiProject Computer Security 1384:http://spyreveal.com/keyloggerremoval 1196:http://spyreveal.com/keyloggerremoval 434:This article is within the scope of 283:This article is within the scope of 213: 684:I think that some information from 236:It is of interest to the following 23:for discussing improvements to the 13: 2037:C-Class Computer Security articles 2017:C-Class Computer hardware articles 1960:commons:Category:Keystroke logging 525: 487: 368: 344: 14: 2063: 1992:Low-importance Computing articles 1837:. Please take a moment to review 1486:. Please take a moment to review 1356:. Please take a moment to review 880:and their associated keypads for 873:challenge-response authentication 564:Identify articles for improvement 2002:Low-importance software articles 1313: 1270: 594: 427: 400: 276: 249: 218: 45:Click here to start a new topic. 1190:Suggest Removal of Reference 15 686:http://kyps.net/home/comparison 474:This article has been rated as 331:This article has been rated as 311:Knowledge:WikiProject Computing 2052:All Computer Security articles 1801:20:42, 28 September 2019 (UTC) 1119:Query about onscreen keyboards 950: 314:Template:WikiProject Computing 1: 1665:14:47, 31 December 2017 (UTC) 1595:A flop with two of the images 1198:I suggest removing the link. 1152: 1146: 1111:08:13, 18 December 2019 (UTC) 1096:07:53, 18 December 2019 (UTC) 919: 913: 831: 825: 782: 776: 661: 535:will be generated shortly by 517:WikiProject Computer Security 496:This article is supported by 448:and see a list of open tasks. 437:WikiProject Computer Security 377:This article is supported by 353:This article is supported by 305:and see a list of open tasks. 42:Put new text under old text. 1931:14:29, 9 December 2017 (UTC) 1642:00:30, 7 December 2017 (UTC) 1616:00:20, 7 December 2017 (UTC) 1590:22:06, 5 December 2017 (UTC) 1208:09:16, 5 December 2013 (UTC) 1029:13:32, 18 October 2010 (UTC) 996:13:13, 18 October 2010 (UTC) 981:Non-QWERTY / custom layouts? 957:Austin Modine (2008-10-10). 931:20:43, 4 November 2009 (UTC) 906:16:48, 2 November 2009 (UTC) 843:04:29, 31 October 2009 (UTC) 818:04:11, 31 October 2009 (UTC) 794:20:25, 29 October 2009 (UTC) 769:17:49, 29 October 2009 (UTC) 653:16:09, 28 January 2009 (UTC) 380:Computer hardware task force 7: 1781:11:57, 18 August 2019 (UTC) 1752:21:07, 3 January 2018 (UTC) 1743:21:03, 3 January 2018 (UTC) 1724:11:16, 3 January 2018 (UTC) 1714:22:58, 2 January 2018 (UTC) 1693:21:20, 2 January 2018 (UTC) 1293:to reactivate your request. 1281:has been answered. Set the 1231:10:30, 9 January 2014 (UTC) 1185:01:03, 11 August 2011 (UTC) 747:23:16, 12 August 2019 (UTC) 725:04:46, 3 October 2011 (UTC) 50:New to Knowledge? Welcome! 10: 2068: 1987:C-Class Computing articles 1972:08:13, 19 April 2024 (UTC) 1950:14:24, 18 April 2024 (UTC) 1894:(last update: 5 June 2024) 1830:Hello fellow Wikipedians, 1553:(last update: 5 June 2024) 1479:Hello fellow Wikipedians, 1433:(last update: 5 June 2024) 1349:Hello fellow Wikipedians, 1258:17:20, 10 March 2016 (UTC) 1050:21:23, 15 March 2011 (UTC) 674:22:20, 18 April 2009 (UTC) 480:project's importance scale 460:Computer Security articles 337:project's importance scale 1997:C-Class software articles 1766:13:53, 3 April 2019 (UTC) 1164:11:55, 19 July 2011 (UTC) 1135:22:57, 18 July 2011 (UTC) 1068:22:57, 18 July 2011 (UTC) 704:18:35, 21 July 2009 (UTC) 510: 495: 473: 422: 376: 352: 330: 271: 244: 80:Be welcoming to newcomers 1339:06:23, 25 May 2016 (UTC) 1308:06:18, 25 May 2016 (UTC) 1155: 1153: 1147: 922: 920: 914: 834: 832: 826: 785: 783: 777: 664: 662: 659:acces to your computer. 1826:External links modified 1475:External links modified 1470:04:33, 5 May 2017 (UTC) 1345:External links modified 2032:All Computing articles 1633: 1607: 530: 492: 373: 349: 299:information technology 226:This article is rated 75:avoid personal attacks 2012:All Software articles 1632: 1606: 529: 499:WikiProject Computing 491: 372: 348: 286:WikiProject Computing 100:Neutral point of view 1875:regular verification 1534:regular verification 1414:regular verification 554:Tag related articles 515:Things you can help 356:WikiProject Software 105:No original research 1865:After February 2018 1524:After February 2018 1404:After February 2018 1177:MaverickHunter40245 542:More information... 1919:InternetArchiveBot 1870:InternetArchiveBot 1634: 1608: 1578:InternetArchiveBot 1529:InternetArchiveBot 1458:InternetArchiveBot 1409:InternetArchiveBot 531: 493: 374: 350: 317:Computing articles 232:content assessment 86:dispute resolution 47: 1895: 1835:Keystroke logging 1803: 1791:comment added by 1712: 1705:work for you. -- 1554: 1484:Keystroke logging 1434: 1354:Keystroke logging 1337: 1297: 1296: 1138: 1098: 1082:comment added by 1071: 878:Smartcard readers 749: 737:comment added by 694:comment added by 631: 630: 588: 587: 584: 583: 580: 579: 576: 575: 451:Computer Security 442:computer security 408:Computer Security 395: 394: 391: 390: 212: 211: 66:Assume good faith 43: 25:Keystroke logging 2059: 1929: 1920: 1893: 1892: 1871: 1786: 1741: 1734: 1709: 1703: 1691: 1663: 1657: 1640: 1614: 1588: 1579: 1552: 1551: 1530: 1468: 1459: 1432: 1431: 1410: 1325: 1321:Blank request — 1317: 1316: 1288: 1284: 1274: 1273: 1267: 1250:FockeWulf FW 190 1170:Legality Section 1162: 1161: 1159: 1150: 1149: 1133: 1077: 1066: 973: 972: 970: 969: 954: 929: 928: 926: 917: 916: 841: 840: 838: 829: 828: 792: 791: 789: 780: 779: 732: 706: 672: 671: 670: 668: 626: 598: 590: 559:Article requests 544: 512: 511: 462: 461: 458: 455: 452: 431: 424: 423: 418: 415: 404: 397: 396: 319: 318: 315: 312: 309: 280: 273: 272: 267: 264: 253: 246: 245: 229: 223: 222: 214: 206: 179: 178: 164: 95:Article policies 16: 2067: 2066: 2062: 2061: 2060: 2058: 2057: 2056: 1977: 1976: 1938: 1923: 1918: 1886: 1879:have permission 1869: 1843:this simple FaQ 1828: 1737: 1728: 1697: 1687: 1659: 1651: 1636: 1610: 1597: 1582: 1577: 1545: 1538:have permission 1528: 1492:this simple FaQ 1477: 1462: 1457: 1425: 1418:have permission 1408: 1362:this simple FaQ 1347: 1314: 1300:112.208.233.228 1286: 1282: 1271: 1265: 1238: 1215: 1192: 1172: 1121: 1037: 1035:Legitimate Uses 983: 978: 977: 976: 967: 965: 955: 951: 864:security tokens 756: 712: 689: 682: 660: 636: 627: 621: 603: 545: 540: 459: 456: 453: 450: 449: 416: 410: 316: 313: 310: 307: 306: 265: 259: 230:on Knowledge's 227: 208: 207: 202: 121: 116: 115: 114: 91: 61: 12: 11: 5: 2065: 2055: 2054: 2049: 2044: 2039: 2034: 2029: 2024: 2019: 2014: 2009: 2004: 1999: 1994: 1989: 1975: 1974: 1937: 1934: 1913: 1912: 1905: 1858: 1857: 1849:Added archive 1827: 1824: 1823: 1822: 1821: 1820: 1819: 1818: 1817: 1816: 1815: 1814: 1813: 1812: 1811: 1810: 1809: 1808: 1807: 1806: 1805: 1804: 1758:Notimelivelong 1716: 1627: 1626: 1625: 1624: 1596: 1593: 1572: 1571: 1564: 1517: 1516: 1508:Added archive 1506: 1498:Added archive 1476: 1473: 1452: 1451: 1444: 1397: 1396: 1388:Added archive 1386: 1378:Added archive 1376: 1368:Added archive 1346: 1343: 1342: 1341: 1295: 1294: 1275: 1264: 1261: 1237: 1234: 1214: 1211: 1191: 1188: 1171: 1168: 1167: 1166: 1139: 1120: 1117: 1116: 1115: 1114: 1113: 1073: 1072: 1036: 1033: 1032: 1031: 1018: 1010: 1006: 1002: 988:94.254.189.211 982: 979: 975: 974: 948: 947: 943: 942: 941: 940: 939: 938: 937: 936: 935: 934: 933: 886: 857: 855: 854: 853: 852: 851: 850: 849: 848: 805: 755: 752: 751: 750: 711: 708: 681: 678: 677: 676: 663:Socrates2008 ( 635: 632: 629: 628: 623: 619: 617: 614: 613: 605: 604: 599: 593: 586: 585: 582: 581: 578: 577: 574: 573: 572: 571: 568: 565: 562: 555: 552: 549: 533:Article alerts 524: 521: 520: 508: 507: 504:Low-importance 494: 484: 483: 476:Low-importance 472: 466: 465: 463: 446:the discussion 432: 420: 419: 417:Low‑importance 405: 393: 392: 389: 388: 385:Low-importance 375: 365: 364: 361:Low-importance 351: 341: 340: 333:Low-importance 329: 323: 322: 320: 303:the discussion 281: 269: 268: 266:Low‑importance 254: 242: 241: 235: 224: 210: 209: 200: 198: 197: 194: 193: 181: 180: 118: 117: 113: 112: 107: 102: 93: 92: 90: 89: 82: 77: 68: 62: 60: 59: 48: 39: 38: 35: 34: 28: 9: 6: 4: 3: 2: 2064: 2053: 2050: 2048: 2045: 2043: 2040: 2038: 2035: 2033: 2030: 2028: 2025: 2023: 2020: 2018: 2015: 2013: 2010: 2008: 2005: 2003: 2000: 1998: 1995: 1993: 1990: 1988: 1985: 1984: 1982: 1973: 1969: 1965: 1961: 1957: 1954: 1953: 1952: 1951: 1947: 1943: 1933: 1932: 1927: 1922: 1921: 1910: 1906: 1903: 1899: 1898: 1897: 1890: 1884: 1880: 1876: 1872: 1866: 1861: 1856: 1852: 1848: 1847: 1846: 1844: 1840: 1836: 1831: 1802: 1798: 1794: 1793:64.53.233.212 1790: 1784: 1783: 1782: 1778: 1774: 1769: 1768: 1767: 1763: 1759: 1755: 1754: 1753: 1750: 1746: 1745: 1744: 1740: 1732: 1727: 1726: 1725: 1722: 1717: 1715: 1711: 1708: 1701: 1696: 1695: 1694: 1690: 1685: 1681: 1678: 1675: 1671: 1668: 1667: 1666: 1662: 1655: 1650: 1649: 1648: 1647: 1646: 1645: 1644: 1643: 1639: 1631: 1622: 1621: 1620: 1619: 1618: 1617: 1613: 1605: 1601: 1592: 1591: 1586: 1581: 1580: 1569: 1565: 1562: 1558: 1557: 1556: 1549: 1543: 1539: 1535: 1531: 1525: 1520: 1515: 1511: 1507: 1505: 1501: 1497: 1496: 1495: 1493: 1489: 1485: 1480: 1472: 1471: 1466: 1461: 1460: 1449: 1445: 1442: 1438: 1437: 1436: 1429: 1423: 1419: 1415: 1411: 1405: 1400: 1395: 1391: 1387: 1385: 1381: 1377: 1375: 1371: 1367: 1366: 1365: 1363: 1359: 1355: 1350: 1340: 1335: 1332: 1329: 1324: 1320: 1312: 1311: 1310: 1309: 1305: 1301: 1292: 1289:parameter to 1280: 1276: 1269: 1268: 1260: 1259: 1255: 1251: 1247: 1244: 1241: 1233: 1232: 1228: 1224: 1220: 1210: 1209: 1205: 1201: 1197: 1187: 1186: 1182: 1178: 1165: 1158: 1151: 1142: 1141: 1140: 1136: 1131: 1130: 1127: 1112: 1108: 1104: 1100: 1099: 1097: 1093: 1089: 1085: 1084:117.20.71.152 1081: 1074: 1069: 1064: 1063: 1060: 1054: 1053: 1052: 1051: 1047: 1043: 1030: 1026: 1022: 1019: 1016: 1011: 1007: 1003: 1000: 999: 998: 997: 993: 989: 964: 960: 953: 949: 946: 932: 925: 918: 909: 908: 907: 903: 899: 895: 894: 893: 892: 891: 890: 889: 888: 887: 883: 879: 874: 869: 868:in some cases 865: 861: 846: 845: 844: 837: 830: 821: 820: 819: 815: 811: 806: 802: 797: 796: 795: 788: 781: 773: 772: 771: 770: 766: 762: 748: 744: 740: 736: 729: 728: 727: 726: 722: 718: 707: 705: 701: 697: 693: 687: 675: 667: 657: 656: 655: 654: 650: 646: 640: 616: 615: 612: 611: 607: 606: 602: 597: 592: 591: 569: 566: 563: 560: 556: 553: 550: 547: 546: 543: 538: 534: 528: 523: 522: 518: 514: 513: 509: 505: 502:(assessed as 501: 500: 490: 486: 485: 481: 477: 471: 468: 467: 464: 447: 443: 439: 438: 433: 430: 426: 425: 421: 414: 409: 406: 403: 399: 398: 386: 383:(assessed as 382: 381: 371: 367: 366: 362: 359:(assessed as 358: 357: 347: 343: 342: 338: 334: 328: 325: 324: 321: 304: 300: 296: 292: 288: 287: 282: 279: 275: 274: 270: 263: 258: 255: 252: 248: 247: 243: 239: 233: 225: 221: 216: 215: 196: 195: 192: 189: 187: 183: 182: 177: 173: 170: 167: 163: 159: 155: 152: 149: 146: 143: 140: 137: 134: 131: 127: 124: 123:Find sources: 120: 119: 111: 110:Verifiability 108: 106: 103: 101: 98: 97: 96: 87: 83: 81: 78: 76: 72: 69: 67: 64: 63: 57: 53: 52:Learn to edit 49: 46: 41: 40: 37: 36: 32: 26: 22: 18: 17: 1939: 1917: 1914: 1889:source check 1868: 1862: 1859: 1832: 1829: 1787:— Preceding 1683: 1676: 1635: 1609: 1598: 1576: 1573: 1548:source check 1527: 1521: 1518: 1481: 1478: 1456: 1453: 1428:source check 1407: 1401: 1398: 1351: 1348: 1330: 1318: 1298: 1290: 1279:edit request 1248: 1245: 1242: 1239: 1223:Michael Dave 1216: 1200:Michael Dave 1193: 1173: 1148:Socrates2008 1145: 1124: 1122: 1078:— Preceding 1057: 1038: 1014: 984: 966:. Retrieved 963:The Register 952: 944: 915:Socrates2008 912: 867: 856: 827:Socrates2008 824: 800: 778:Socrates2008 775: 757: 739:95.147.5.140 733:— Preceding 713: 696:78.51.34.180 683: 645:96.237.5.182 641: 637: 608: 600: 532: 497: 475: 435: 378: 354: 332: 284: 238:WikiProjects 184: 171: 165: 157: 150: 144: 138: 132: 122: 94: 19:This is the 1773:FlippyFlink 1213:Adding Link 860:smart cards 717:Carl.antuar 690:—Preceding 148:free images 31:not a forum 1981:Categories 1926:Report bug 1585:Report bug 1465:Report bug 1283:|answered= 1129:Farmbrough 1062:Farmbrough 968:2009-04-18 945:References 898:Noogenesis 847:How about: 810:Noogenesis 761:Noogenesis 1909:this tool 1902:this tool 1654:Shellwood 1568:this tool 1561:this tool 1448:this tool 1441:this tool 1319:Not done: 1021:bobrayner 862:or other 537:AAlertBot 413:Computing 308:Computing 295:computing 291:computers 257:Computing 88:if needed 71:Be polite 21:talk page 1964:Peaceray 1915:Cheers.— 1789:unsigned 1749:~ GB fan 1739:Every875 1721:~ GB fan 1700:Every875 1689:Every875 1680:contribs 1661:Every875 1638:Every875 1612:Every875 1574:Cheers.— 1454:Cheers.— 1103:Johnuniq 1092:contribs 1080:unsigned 1042:Bostoner 735:unsigned 692:unsigned 601:Archives 262:Software 186:Archives 56:get help 29:This is 27:article. 1942:ClarkD3 1839:my edit 1488:my edit 1358:my edit 858:Use of 478:on the 335:on the 228:C-class 154:WP refs 142:scholar 1731:GB fan 1682:) Can 1670:GB fan 1323:JJMC89 801:safest 634:LiveCD 297:, and 234:scale. 126:Google 1707:intgr 1287:|ans= 1277:This 519:with: 169:JSTOR 130:books 84:Seek 1968:talk 1946:talk 1797:talk 1777:talk 1762:talk 1674:talk 1304:talk 1254:talk 1227:talk 1204:talk 1181:talk 1157:Talk 1126:Rich 1107:talk 1088:talk 1059:Rich 1046:talk 1025:talk 992:talk 924:Talk 902:talk 836:Talk 814:talk 787:Talk 765:talk 743:talk 721:talk 700:talk 666:Talk 649:talk 162:FENS 136:news 73:and 1883:RfC 1853:to 1684:you 1542:RfC 1512:to 1502:to 1422:RfC 1392:to 1382:to 1372:to 1285:or 882:PIN 470:Low 327:Low 176:TWL 1983:: 1970:) 1948:) 1896:. 1891:}} 1887:{{ 1799:) 1779:) 1771:-- 1764:) 1555:. 1550:}} 1546:{{ 1435:. 1430:}} 1426:{{ 1306:) 1291:no 1256:) 1229:) 1206:) 1183:) 1132:, 1109:) 1094:) 1090:• 1065:, 1048:) 1027:) 994:) 961:. 904:) 816:) 767:) 745:) 723:) 702:) 651:) 506:). 411:: 387:). 363:). 293:, 260:: 156:) 54:; 1966:( 1944:( 1928:) 1924:( 1911:. 1904:. 1795:( 1775:( 1760:( 1733:: 1729:@ 1702:: 1698:@ 1677:· 1672:( 1656:: 1652:@ 1587:) 1583:( 1570:. 1563:. 1467:) 1463:( 1450:. 1443:. 1336:) 1334:C 1331:· 1328:T 1326:( 1302:( 1252:( 1225:( 1202:( 1179:( 1160:) 1154:( 1137:. 1105:( 1086:( 1070:. 1044:( 1023:( 1017:" 990:( 971:. 927:) 921:( 900:( 839:) 833:( 812:( 790:) 784:( 763:( 741:( 719:( 698:( 669:) 647:( 610:1 561:) 482:. 339:. 240:: 191:1 188:: 172:· 166:· 158:· 151:· 145:· 139:· 133:· 128:( 58:.

Index

talk page
Keystroke logging
not a forum
Click here to start a new topic.
Learn to edit
get help
Assume good faith
Be polite
avoid personal attacks
Be welcoming to newcomers
dispute resolution
Neutral point of view
No original research
Verifiability
Google
books
news
scholar
free images
WP refs
FENS
JSTOR
TWL
Archives
1

content assessment
WikiProjects
WikiProject icon
Computing

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑