The notorious but the most needed as well as used function in the world. Which is a build in function to read character or Data from the keyboard. Yes one of the most useful functions. But i wrong hand, the most deadliest function.
If the function succeeds, the return value specifies whether the key was pressed since the last call to GetAsyncKeyState, and whether the key is currently up or down. If the most significant bit is set, the key is down, and if the least significant bit is set, the key was pressed after the previous call to GetAsyncKeyState. Nothing but means that this fuction records the most previous key you pressed. shu.. shu... how simple!
A virtual key. If the desired virtual key is a letter or digit (A through Z, a through z, or 0 through 9), nVirtKey must be set to the ASCII value of that character. For other keys, it must be a virtual-key code. If a non-English keyboard layout is used, virtual keys with values in the range ASCII A through Z and 0 through 9 are used to specify most of the character keys.
Thats the technical documentation introduction from MSDN library and ofcourse it means nothing to the no techy noobs. Now people who are thinking about retrieving the valuable keystrokes from an end user in realtime. Thinga are getting very handy.. ain it? :D
Oh now lets check the future of this small 2 bits of info.. :) . what if some one who hates you or who like you (since you have good amount saved in bank account) can create an exe using this function and copy into a pendrive along with an icon with interesting image or a autorun.inf file that make the exe to run on when ever you plug this pendrive into your computer so that it will replicate and make a copy in your own computer and log the keystroke into a small txt file and save it a dll or sys file somewhere in the windows folder. ! what if the same exe can push some string it the registry that make this exe to start work when ever you open your windows Application.! And what if the exe can send the small sys or dll file that he saved before to his own email address on frequent intervel of time. Look he dont even need to open a port like trojans.! or otherwise what if he can upload the same file to some ftp server using a ftp function by supplying the username and password and IP of that server which he might have created some where in the free publisc server like orgfree.com!
Lol.. You are as good as dead. :D