answersLogoWhite

0


Best Answer

yes sure. A keylogger can be attached to any file, an image, doc file or email attachment, send it to the target computer or upload to server and let target computer download it. When the file is on there, so long as it is opened, the keylogger will be released and installed automatically.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Can you access computer which you have not touched at all with a keylogger software?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How do you setup keyloggers on computer to obtain passwords?

install a keylogger to the computer you want to obtain passwords from if you have no physical access to that computer, send a remote keylogger attached to a file to the target computer.


Is a keylogger a virus?

Not necessarily. Let's take Aobo Mac keylogger as an example, which is not virus. Aobo mac keylogger is neither spyware nor virus. Virus or other spyware is normally installed as a Trojan horse, then used to steal the users' personal information like online accounts, bank account information, etc. A distinct feature of virus is that it is installed automatically and stealthily into your computer by malicious links or bundling to another piece of software and then infects your computer without your notice. Usually, they are vicious programs used by those bad guys to do bad things. However, if someone wants to install a mac keylogger in your computer, it is necessary for him or her to have physical contact with your computer. Otherwise, the keylogger can not be installed. Generally speaking, anyone else can not install a keylogger in your mac without your permission unless they have other access to your computer. If you use a keylogger on your mac, all the activities on your computer will be under your control, including when and how your computer is used.


What damage is caused by key logging software?

Keylogging software doesn't cause damage, the main priority of a keylogger program is to record what has been typed into the computer/what keys have been pressed, these programs are created by 'hackers' to gain access to sensitive information.


My son has a computer but I cant get on it to put a keylogger on it and I fear he is on bad websites.Is there any possible way to send one to his computer?

You're the parent. Take control of the situation and if necessary, remove the computer until you have unrestricted access. If necessary, take the box to a specialist and have filters and a keylogger installed.


What are the benefits of using Perfect Keylogger?

The main benefit of using Perfect Keylogger is that it allows one to know who has access to one's personal computer. It also enables one to print a report of this type of activity which is its second main benefit.


How does remote-access software help in the troubleshooting process?

Remote access software is used to access your desktop or laptop computer from another location and using another computer. These software programs allow you to log on to your computer when you are away from home.


What does PC Remote Access software allow one to do?

Remote PC software is used to access a computer using a different computer. One can then control the other computer without being in the same room as that computer.


Does remote access software allow you to access your home computer from a different computer?

Indeed it does! With appropriate software and set-up, you can access all you home computer pictures, documents and movies, anywhere in the world and at any time.


How can access control software combat computer crime?

Access control software will limit access to different information in an organization. With limited access, individuals that are interested in taking information will be limited.


Is there software that can shutdown other software?

Well, technically, if you use Logmein from one computer, and access another computer with it, remotely, you can shutdown other software by normal means.


Software that enables your computer to connect to another computer?

if the machines are using XP or vista then you already have the software!! Remote Access Server (RAS)


How can someone steal my password when not on my computer?

There are a multitude of ways someone can gain access to someone's password without physical access to the computer:Through a keylogger or some form of spywareThrough a spoofed login page to a website (phishing)Through the compromise of a website that does not store account information securely (many pieces of software like web forums may store passwords in plaintext)