Quote:
Originally Posted by shabbir
None apart from phishing where you get hold of some private data of the user.
Yeah. If you had physical access to the computer you might be able to install a key logger, or disguise one, but phishing is the only easy/logical way...