answersLogoWhite

0

You're talking about using a piece of key-logging software. HOWEVER - unless you're (a) only recording your own data entry key-strokes (for later analysis), or (b) the remote user is fully aware that their activity is being remotely monitored - using the software would likely be illegal in your country, and you would pay the penalty when you're caught ! Remember - the remote computer would have a record of where it's sending the data, and the target machine would have a record of being connected to the remote computer (or the web-site) - thus proving you had remote access set up !

User Avatar

Wiki User

12y ago

What else can I help you with?

Related Questions

What is the output displayed by the following program when the data entered are 5 and 7?

Impossible to say without seeing the program's source.


What is a therom?

Techniques used for validation and verification Data entered into a database or spreadsheet is usually checked using processes called validation and verification. Validation is an automatic computer check to ensure that the data entered is sensible, reasonable, complete and within acceptable boundaries. It does not check the accuracy of data. The checking of the data entered is done by software that can either be part of the input system or a separate program that checks the data. Types of validation There are a number of validation types that can be used to check the data that is being entered. · Range check: checks that a value falls within the specified range, it will reject any data items outside an expected range. For example, number of hours worked must be less than 50 and more than 0. · Presence check: checks that data has been entered into a field, it will reject the data where the required fields have been left blank. For example, in most databases a key field cannot be left blank. · Length check: ensures that the data entered is of reasonable length. For example, a password which needs to be six letters long. · Type check: ensures data is of a particular data type. For example, a number of items in stock will be entered as an integer (whole number). · Format check: ensures a data item matches a pre-determined pattern of letters and/or numbers. For example, a National Insurance number is in the form LL 99 99 99 L where L is any letter and 9 is any number · Lookup checks: ensures that data matches one of a limited number of valid entries. For example subjects studied in a school should be selected from a list of Mathematics, English etc. Verification is a process used to check that the data has been entered accurately, is consistent and has not been corrupted. Verification confirms the integrity of data as it is copied between different parts of a computer system. Copying should not change the data. Differences detected would mean an error in the transfer. Types of verification The verification checks may include:- · Double entry verification: to ensure data typed into a computer system is entered accurately. The data is entered twice, by different operators, and compared by the system. Any differences can be identified and manually corrected. · Visual verification: data is entered and the original data is compared to the data entered into the system; for example by comparing the data on the data on the data capture form with a printout of the database, or with the entered data on the screen.


Data validation best refers to?

Data Validation is a process that ensures that data entered into the database form, a web form, or a computer program conforms to the correct data type.


How do you make a program into a website?

If you mean getting data from a website to a software, you can use API to do it.


How to check the data of the website?

I have no idea


What check ensures that the data entered into the database is within a certain range of numbers?

Range


Where can data be entered?

Data can be entered by using the enter key.


What is the best program for HDD data recovery?

The best program for HDD data recovery is Symantec. The best website to look for more information is www.Symantec.com/backup_recovery and www.WeRecoverData.com/Data-Recovery


What is a program that allows a user to enter rows and columns of numbers into main memory and to perform calculations on the numbers that have been entered?

The program is a Spreadsheet. eg Microsoft Excel


Explain why validation cannot stop incorrect information from being entered into a database?

Because it just checks if the wrong data has been entered in the wrong field.


What displays data as entered?

A computer monitor displays any data that is entered on the keyboard.


What can be typed and entered into a cell?

Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.Any kind of data, including text, numbers, dates, times and logical data can be entered into a cell.