How to protect yourself from Keyloggers

So we discussed about keylogging ! Now lets look into its prevention!




1.Enable your firewalls. This is especially important if you are hooked up to a DSL/Broadband connection.A firewall won't stop the keylogger in a literal sense, but it may help prevent the transmission of the information back to the hacker.

2.Install anti-spyware and anti-virus software. Keylogger spyware often invades your PC system via viruses, Trojans and other malware. Your anti-spyware and antiviral are your first line of defense.

3.Obtain and use an automated form-filler, particularly if you often enter personal or financial information at any website. These form fillers encrypt and save this confidential information and automatically fill it in, so you won't have to type it in.

4.Consider using an on screen keyboard. You would enter your information into this keyboard using your mouse rather than typing it in. Key-logging software can only record information that is typed in rather than entered with your mouse. Speech recognition software would serve the same purpose, as no keystrokes or mouse movements can register.

5.Get an alternative keyboard layout. Most of the keylogger software available is based on the traditional QWERTY layout. If you use a layout such as DVORAK, the captured keystrokes do not make sense unless converted.

6.Keep track of the programs that are running on your computer. Keyloggers tend to run in the background, out of sight. You can check the programs via the Task Manager by pressing (Ctrl + Alt + Delete). Your USB port and computer games such as the PS2 could be used to install keylogger software.

7.Use a one time password (OTP). An OTP is key logger proof, because once it is used, it is automatically invalidated. This is especially helpful if you are using a public compute

8.There are programs like virtual box and vmware that allow you to run multiple operating systems on one pc in the same time. You install the safe things in the main operating system and you install everything that might contain a keylogger in a virtual machine.

Source : ehow.com

Now what if I'm infected with a keylogger..?

simply visit  http://www.2-spyware.com/keyloggers-removal

Comments

  • Disclaimer

    This Site may contain articles related to "Hacking" but they are hosted in our site for educational purpose only.They are meant to give a better insight to the recent cyber threats. Neither Te-Bay nor it's contributors will be responsible for any damage arising from misuse of information hosted here . If you are not willing to accept these conditions, please stop using this site and the information hosted here.

  • Search

  • Buy & Get Lucky On Te-Bay

    Cheapest & Genuine Online Store
    Flipkart.com

    We Are Hot Favorite For...

      Subscribe 2 Our Newsletter

      Enter your email address:

      Delivered by FeedBurner

      Join our Community