In this example, I will show - describe the way the malware module works, namely the keylogger.

In this example, I will use the option HOOKING, specificl fuctnions called CallBack.

  


The whole photo-video consists of two parts:
- first: theory
- second: example+ code description


THEORY






Kód
 




Source codes are available to mebers of  CyberSecurity Unit ◄  forum viry.cz.