“6. The method according to claim 1, wherein the random sequence of input events comprises one or more mouse click events. “7. The method according to claim 1, wherein any key logging malware active ...