keystroke

(redirected from keystrokes)
Also found in: Thesaurus.

key·stroke

 (kē′strōk′)
n.
A stroke of a key, as on a computer keyboard.

key′stroke′ v.

keystroke

(ˈkiːˌstrəʊk)
n
(Printing, Lithography & Bookbinding) a single operation of the mechanism of a typewriter or keyboard-operated typesetting machine by the action of a key

key•stroke

(ˈkiˌstroʊk)

n.
one stroke of any key on a machine operated by a keyboard, as a typewriter or computer terminal.
[1905–10]
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.keystroke - the stroke of a key; one depression of a key on a keyboard; "the number of keystrokes was used as a measure of work"
stroke - a single complete movement
Translations

keystroke

[ˈkiːstrəʊk] Npulsación f (de la tecla)

keystroke

[ˈkiːstrəʊk] ncaractère m saisi
the number of keystrokes → le nombre de caractères entrés or saisis

keystroke

[ˈkiːˌstrəʊk] n (on keyboard) → battuta
References in periodicals archive ?
The audio driver installed on some laptops from HP contain a keylogger that records all of a user's keystrokes and stores the information in a way that could be compromised easily, security company (https://www.
Once installed, the keylogger records all keystrokes, and then e-mails the information and other data to the computer hacker.
has announced that they have released a new version of ShortKeys software, their keystrokes for Windows program with additions and changes that make the program easier to use and more efficient than ever before.
OTC: SFORD) said that it has received an official notice of allowance from the United States Patent Office stating that a second patent application titled "Methods and apparatus for securing keystrokes from being intercepted between the keyboard and a browser" has been approved for issuance.
The researchers said that the infected victim sends all recorded keystrokes to the covert acoustical mesh network while the infected drones forward the keystroke information inside the covert network till the attacker is reached.
And their best practical attack recovered 95% of the keystrokes of a PS/2 keyboard at a distance up to 20 m, even through walls.
The time between each pair of consecutive keystrokes were calculated and recorded from the experiment.
Keylogging software captures a user's keystrokes to gain access to account and password information and subsequently, their online accounts.
A predator could be spotted within 10 keystrokes depending on the speed and rhythm they use on the keyboard following a breakthrough in cybercrime technology.
The subsequent analysis demonstrated that the entire input stream (including erroneous keystrokes and the keystrokes used to correct errors) can be included in the evaluation of performance with a text entry device or text entry rate enhancement method.
Internet users have characteristic patterns of how they time their keystrokes, browse Web sites, and write messages for posting on online bulletin boards.
Three University of Pennsylvania graduate students (Gaurav Shah, Andres Molina, and Matt Blaze) have designed a device that can record keystrokes and transmit them over the Internet to a third party without the user's knowledge.