In this example, I will show - describe the way the malware module works, namely the keylogger.
In this example, I will use the option HOOKING, specificl fuctnions called CallBack.
The whole photo-video consists of two parts:
- first: theory
- second: example+ code description
THEORY
Kód
Source codes are available to mebers of ► CyberSecurity Unit ◄ forum viry.cz.