keylogger<\/a> je ve forenzn\u00edm vy\u0161et\u0159ov\u00e1n\u00ed. Org\u00e1ny \u010dinn\u00e9 v trestn\u00edm \u0159\u00edzen\u00ed a dal\u0161\u00ed vy\u0161et\u0159ovatel\u00e9 mohou keyloggery pou\u017e\u00edvat ke sledov\u00e1n\u00ed aktivit podez\u0159el\u00fdch osob nebo ke shroma\u017e\u010fov\u00e1n\u00ed d\u016fkaz\u016f o trestn\u00e9 \u010dinnosti. Pokud se nap\u0159\u00edklad p\u0159edpokl\u00e1d\u00e1, \u017ee podez\u0159el\u00fd pou\u017eil po\u010d\u00edta\u010d ke sp\u00e1ch\u00e1n\u00ed trestn\u00e9ho \u010dinu, lze keylogger pou\u017e\u00edt k zachycen\u00ed v\u0161ech relevantn\u00edch informac\u00ed zadan\u00fdch na kl\u00e1vesnici.<\/p>\nV n\u011bkter\u00fdch p\u0159\u00edpadech lze keyloggery pou\u017e\u00edt i pro vzd\u011bl\u00e1vac\u00ed \u00fa\u010dely. Nap\u0159\u00edklad studenti informatiky mohou keyloggery pou\u017e\u00edvat, aby l\u00e9pe pochopili, jak funguj\u00ed, a mohli vyv\u00edjet vlastn\u00ed softwarov\u00e9 n\u00e1stroje. Krom\u011b toho mohou keyloggery pou\u017e\u00edvat bezpe\u010dnostn\u00ed profesion\u00e1lov\u00e9 k testov\u00e1n\u00ed zabezpe\u010den\u00ed vlastn\u00edch syst\u00e9m\u016f nebo k v\u00fdvoji nov\u00fdch metod detekce a prevence \u00fatok\u016f keylogger\u016f.<\/p>","protected":false},"excerpt":{"rendered":"
Funk\u010dn\u00ed pou\u017e\u00edv\u00e1n\u00ed monitorovac\u00edho softwaru v dom\u00e1c\u00edch nebo pracovn\u00edch po\u010d\u00edta\u010d\u00edch. Jednou z hlavn\u00edch v\u00fdhod key logger\u016f je jejich schopnost pomoci u\u017eivatel\u016fm sledovat \u010dinnost na vlastn\u00edch po\u010d\u00edta\u010d\u00edch. To m\u016f\u017ee b\u00fdt u\u017eite\u010dn\u00e9 zejm\u00e9na pro rodi\u010de, kte\u0159\u00ed cht\u011bj\u00ed m\u00edt p\u0159ehled o tom, co jejich d\u011bti d\u011blaj\u00ed na internetu, nebo pro majitele firem, kte\u0159\u00ed cht\u011bj\u00ed m\u00edt p\u0159ehled o tom, co jejich d\u011bti d\u011blaj\u00ed na internetu, a [...]<\/p>","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-940","post","type-post","status-publish","format-standard","hentry","category-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/posts\/940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/comments?post=940"}],"version-history":[{"count":8,"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/posts\/940\/revisions"}],"predecessor-version":[{"id":1066,"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/posts\/940\/revisions\/1066"}],"wp:attachment":[{"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/media?parent=940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/categories?post=940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.keyturion.com\/cs\/wp-json\/wp\/v2\/tags?post=940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}