There is no need to tell what a keylogger is but for some n00bs a keylogger can be some kind of mechanism to create a log file of all the keystrokes you made. Keyloggers are of different variety some even offers tracking mouse clicks, takes screenshots periodically. Keyloggers can be software based or hardware based. Software based keyloggers can be remotely activated on a computer by a Trojan. By carefully reading the log file created by keylogger anyone can sieve out the useful information.
Hardware based keyloggers, uses a small socket in the keyboard, which is impossible to bypass. To know if a computer has a hardware keylogger or not look at the keyboard wire at the CPU port if it is connected normally than every thing is fine, but if it is connected to CPU via some other socket or hardware equipment than you must be aware that a Hardware keylogger is working on the computer.
Cybercafés and other PCs are possible threat as you don't know if a keylogger is running on it or not, you even can't find it on Add/Remove programs or in Task Manager as these programs has the ability to hide them. So you should be careful of specific and targeted attacks. Here I am listing some of the techniques/tricks that you can use to avoid being in such conditions.
First I enter P then O then S i.e. I get POS then I use my mouse to click before P and then type S then again use my mouse to click after P and then type O and so on, this will help you a lot.
The above discussed ways can be used bypass software based keyloggers, as well as hardware based keyloggers. But in hardware based keyloggers it will safer if you don't use keyboard at all. In spite you can use on-screen keyboard.
Apart from this securely delete all your data from the public PC so that no trace of your activities can be traced. Don't think that [SHIFT] + [DELETE] will help, since the data is still in hard disk to delete your data securely use programs like Free Commander and Eraser.
Hardware based keyloggers, uses a small socket in the keyboard, which is impossible to bypass. To know if a computer has a hardware keylogger or not look at the keyboard wire at the CPU port if it is connected normally than every thing is fine, but if it is connected to CPU via some other socket or hardware equipment than you must be aware that a Hardware keylogger is working on the computer.
Cybercafés and other PCs are possible threat as you don't know if a keylogger is running on it or not, you even can't find it on Add/Remove programs or in Task Manager as these programs has the ability to hide them. So you should be careful of specific and targeted attacks. Here I am listing some of the techniques/tricks that you can use to avoid being in such conditions.
- A simple Trick
First I enter P then O then S i.e. I get POS then I use my mouse to click before P and then type S then again use my mouse to click after P and then type O and so on, this will help you a lot.
- On-Screen Keyboard
- Carry browser with you
- Deep freeze
- By Software
The above discussed ways can be used bypass software based keyloggers, as well as hardware based keyloggers. But in hardware based keyloggers it will safer if you don't use keyboard at all. In spite you can use on-screen keyboard.
Apart from this securely delete all your data from the public PC so that no trace of your activities can be traced. Don't think that [SHIFT] + [DELETE] will help, since the data is still in hard disk to delete your data securely use programs like Free Commander and Eraser.
0 comments:
Post a Comment