Not cool promoting password stealing to Processing users.
How can you make a phishing-style gmail hacking tutorial and then claim "I don't advocate stealing people's identity" ? You also can't share an HD screencast of all 60 lines of code and then say "I'm not going to give this out." You are already giving it out as long as that video is up, even if the accompanying files aren't available in a convenient package.
There are actually some great uses for key logging in Processing -- for example, realtime visualization a day of typing speeds, or creating playback logs of the keystrokes of somebody playing a computer game, or giving people feedback on the ergonomics of their daily computer use, etc. But this is terrible. You should do something else with all that clever logging work and re-share it as something positive.
Comments
Not cool promoting password stealing to Processing users.
How can you make a phishing-style gmail hacking tutorial and then claim "I don't advocate stealing people's identity" ? You also can't share an HD screencast of all 60 lines of code and then say "I'm not going to give this out." You are already giving it out as long as that video is up, even if the accompanying files aren't available in a convenient package.
There are actually some great uses for key logging in Processing -- for example, realtime visualization a day of typing speeds, or creating playback logs of the keystrokes of somebody playing a computer game, or giving people feedback on the ergonomics of their daily computer use, etc. But this is terrible. You should do something else with all that clever logging work and re-share it as something positive.
Just because hacking is endemic doesn't make it acceptable. This forum does not support hacking or hackers so I have removed the video link.