Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Keyboard technology
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Other issues == === Keystroke logging === Unencrypted [[Bluetooth]] keyboards are known to be vulnerable to signal theft for keylogging by other Bluetooth devices in range. [[Microsoft]] wireless keyboards 2011 and earlier are documented to have this vulnerability.<ref>{{cite web|url=https://techcrunch.com/2015/01/14/this-fake-phone-charger-is-actually-recording-every-key-you-type/?ncid=txtlnkusaolp00000591|title=This Fake Phone Charger Is Actually Recording Every Key You Type|date=14 January 2015|publisher=AOL|work=TechCrunch|url-status=live|archive-url=https://web.archive.org/web/20170810130517/https://techcrunch.com/2015/01/14/this-fake-phone-charger-is-actually-recording-every-key-you-type/?ncid=txtlnkusaolp00000591|archive-date=10 August 2017}}</ref> [[Keystroke logging]] (often called keylogging) is a method of capturing and recording user keystrokes. While it can be used legally to measure employee activity, or by law enforcement agencies to investigate suspicious activities, it is also used by [[Hacker (computer security)|hackers]] for illegal or malicious acts. Hackers use keyloggers to obtain passwords or encryption keys. Keystroke logging can be achieved by both hardware and software means. Hardware key loggers are attached to the keyboard cable or installed inside standard keyboards. Software keyloggers work on the target computer's operating system and gain unauthorized access to the hardware, hook into the keyboard with functions provided by the OS, or use remote access software to transmit recorded data out of the target computer to a remote location. Some hackers also use wireless keylogger sniffers to collect packets of data being transferred from a wireless keyboard and its receiver, and then they crack the encryption key being used to secure wireless communications between the two devices. [[Spyware|Anti-spyware]] applications are able to detect many keyloggers and remove them. Responsible vendors of monitoring software support detection by anti-spyware programs, thus preventing abuse of the software. Enabling a [[Firewall (computing)|firewall]] does not stop keyloggers per se, but can possibly prevent transmission of the logged material over the net if properly configured. [[Network monitoring|Network monitors]] (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the user the chance to prevent the keylogger from "[[phoning home]]" with his or her typed information. Automatic form-filling programs can prevent keylogging entirely by not using the keyboard at all. Most keyloggers can be fooled by alternating between typing the login credentials and typing characters somewhere else in the focus window.<ref>{{cite web |url=http://cups.cs.cmu.edu/soups/2006/posters/herley-poster_abstract.pdf |title=How To Login From an Internet Cafe Without Worrying About Keyloggers |author=Herley, Cormac |author2=Florencio, Dinei |website=Microsoft Research, Redmond |date=2006 |archive-url=https://web.archive.org/web/20170808070236/http://cups.cs.cmu.edu/soups/2006/posters/herley-poster_abstract.pdf |archive-date=8 August 2017 |access-date=10 September 2008 }}</ref>{{update inline|date=March 2024}} Keyboards are also known to emit electromagnetic signatures that can be detected using special spying equipment to reconstruct the keys pressed on the keyboard. Neal O'Farrell, executive director of the Identity Theft Council, revealed to InformationWeek that "More than 25 years ago, a couple of former spooks showed me how they could capture a user's ATM PIN, from a van parked across the street, simply by capturing and decoding the electromagnetic signals generated by every keystroke," O'Farrell said. "They could even capture keystrokes from computers in nearby offices, but the technology wasn't sophisticated enough to focus in on any specific computer."<ref>{{cite web|url=http://www.informationweek.com/security/vulnerabilities-and-threats/6-tips-to-secure-webcams-stop-keyloggers/d/d-id/1113012|title=6 Tips To Secure Webcams, Stop Keyloggers|work=Dark Reading|date=10 December 2013 |url-status=live|archive-url=https://web.archive.org/web/20131230233248/http://www.informationweek.com/security/vulnerabilities-and-threats/6-tips-to-secure-webcams-stop-keyloggers/d/d-id/1113012|archive-date=30 December 2013}}</ref> === Physical injury === The use of a keyboard may cause serious injury (such as [[carpal tunnel syndrome]] or other [[repetitive strain injury|repetitive strain injuries]]) to the hands, wrists, arms, neck or back.<ref>{{cite web |url=https://www.webmd.com/pain-management/carpal-tunnel/how-can-i-prevent-carpal-tunnel-syndrome |title=How To Prevent Carpal Tunnel Syndrome: 9 Hand & Wrist Exercises |access-date=1 April 2021 |archive-date=16 April 2021 |archive-url=https://web.archive.org/web/20210416193708/https://www.webmd.com/pain-management/carpal-tunnel/how-can-i-prevent-carpal-tunnel-syndrome |url-status=live }}</ref> The risks of injuries can be reduced by taking frequent short breaks to get up and walk around a couple of times every hour. Users should also vary tasks throughout the day, to avoid overuse of the hands and wrists. When typing on a keyboard, a person should keep the shoulders relaxed with the elbows at the side, with the keyboard and mouse positioned so that reaching is not necessary. The chair height and keyboard tray should be adjusted so that the wrists are straight, and the wrists should not be rested on sharp table edges.<ref>{{cite web |url=https://discussions.apple.com/thread/2471321 |title=Sharp Edges on Mac Book Pro |access-date=1 April 2021 |archive-date=26 April 2021 |archive-url=https://web.archive.org/web/20210426201812/https://discussions.apple.com/thread/2471321 |url-status=live }}</ref> Wrist or palm rests should not be used while typing.<ref>{{cite web |title=Wrist Rests : OSH Answers |date=23 November 2022 |url=https://www.ccohs.ca/oshanswers/ergonomics/office/wrist.html |access-date=1 April 2021 |archive-date=15 April 2017 |archive-url=https://web.archive.org/web/20170415012243/https://www.ccohs.ca/oshanswers/ergonomics/office/wrist.html |url-status=live }}</ref> Some [[adaptive technology]] ranging from special keyboards, mouse replacements and pen tablet interfaces to speech recognition software can reduce the risk of injury. Pause software reminds the user to pause frequently. Switching to a much more ergonomic mouse, such as a [[vertical mouse]] or joystick mouse may provide relief. By using a [[touchpad]] or a stylus pen with a [[graphic tablet]], in place of a mouse, one can lessen the repetitive strain on the arms and hands.<ref>{{cite book |title=Complete Computer Hardware |page=165 |url=https://books.google.com/books?id=WSYjdR425p4C&pg=PA165 |quote=wrists should not be rested on sharp table edges. ... Switching .. to using a stylus pen with graphic tablet or a trackpad such as ... |access-date=18 May 2022 |archive-date=25 May 2022 |archive-url=https://web.archive.org/web/20220525161757/https://books.google.com/books?id=WSYjdR425p4C&pg=PA165 |url-status=live }}</ref>
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)