
Say hallo to my little friend.
It can be your friend, too. But, friends or not, I would still recommend that you get your ass up right now and make damn sure there is nothing between your keyboard and computer or any occult software in your pc's start up routine. Because sometimes your best friend is your worst enemy.
I've been using keystroke loggers for unauthorized access to, well, all sorts of things ever since high school. In a time when gaining access to a system room is problematic, codes take longer to break, and most of the people 'in the know' have steeled themselves against social engineering, keystroke loggers have consistently been and continue to be my weapon of choice when attempting to gain access to 'unauthorized information'.
Because I don't believe in having information that isn't accessible, and my intellectual arrogance has led my definition of 'need-to-know basis' to encompass everything.
It should be stated, however, that it is better to be quietly 'in the know' once you have gained access to the desired info then it is to wreck havoc. Priority information is like a heavy sword, if wielded stupidly, you will only cut yourself up while delivering glancing blows to your enemy.
Good uses of priority information can involve using it to curry favor with your superiors (eg recommending plans of action similar to plans their own design, giving the appearance of being on the same page), and staying well ahead of any sort of inspection headed your way.
Ethical implications? Decide for yourself. I certainly would never be caught in connection with one. But keeping an eye on those keeping an eye on you is always profitable, and arguably of strong strategic importance.

No comments:
Post a Comment