How to protect yourself from Keyloggers
So we discussed about keylogging ! Now lets look into its prevention!
1.Enable your firewalls. This is especially important if you are hooked up to a DSL/Broadband connection.A firewall won't stop the keylogger in a literal sense, but it may help prevent the transmission of the information back to the hacker.
2.Install anti-spyware and anti-virus software. Keylogger spyware often invades your PC system via viruses, Trojans and other malware. Your anti-spyware and antiviral are your first line of defense.
3.Obtain and use an automated form-filler, particularly if you often enter personal or financial information at any website. These form fillers encrypt and save this confidential information and automatically fill it in, so you won't have to type it in.
4.Consider using an on screen keyboard. You would enter your information into this keyboard using your mouse rather than typing it in. Key-logging software can only record information that is typed in rather than entered with your mouse. Speech recognition software would serve the same purpose, as no keystrokes or mouse movements can register.
5.Get an alternative keyboard layout. Most of the keylogger software available is based on the traditional QWERTY layout. If you use a layout such as DVORAK, the captured keystrokes do not make sense unless converted.
6.Keep track of the programs that are running on your computer. Keyloggers tend to run in the background, out of sight. You can check the programs via the Task Manager by pressing (Ctrl + Alt + Delete). Your USB port and computer games such as the PS2 could be used to install keylogger software.
7.Use a one time password (OTP). An OTP is key logger proof, because once it is used, it is automatically invalidated. This is especially helpful if you are using a public compute
8.There are programs like virtual box and vmware that allow you to run multiple operating systems on one pc in the same time. You install the safe things in the main operating system and you install everything that might contain a keylogger in a virtual machine.
Source : ehow.com
Now what if I'm infected with a keylogger..?
simply visit http://www.2-spyware.com/keyloggers-removal
1.Enable your firewalls. This is especially important if you are hooked up to a DSL/Broadband connection.A firewall won't stop the keylogger in a literal sense, but it may help prevent the transmission of the information back to the hacker.
2.Install anti-spyware and anti-virus software. Keylogger spyware often invades your PC system via viruses, Trojans and other malware. Your anti-spyware and antiviral are your first line of defense.
3.Obtain and use an automated form-filler, particularly if you often enter personal or financial information at any website. These form fillers encrypt and save this confidential information and automatically fill it in, so you won't have to type it in.
4.Consider using an on screen keyboard. You would enter your information into this keyboard using your mouse rather than typing it in. Key-logging software can only record information that is typed in rather than entered with your mouse. Speech recognition software would serve the same purpose, as no keystrokes or mouse movements can register.
5.Get an alternative keyboard layout. Most of the keylogger software available is based on the traditional QWERTY layout. If you use a layout such as DVORAK, the captured keystrokes do not make sense unless converted.
6.Keep track of the programs that are running on your computer. Keyloggers tend to run in the background, out of sight. You can check the programs via the Task Manager by pressing (Ctrl + Alt + Delete). Your USB port and computer games such as the PS2 could be used to install keylogger software.
7.Use a one time password (OTP). An OTP is key logger proof, because once it is used, it is automatically invalidated. This is especially helpful if you are using a public compute
8.There are programs like virtual box and vmware that allow you to run multiple operating systems on one pc in the same time. You install the safe things in the main operating system and you install everything that might contain a keylogger in a virtual machine.
Source : ehow.com
Now what if I'm infected with a keylogger..?
simply visit http://www.2-spyware.com/keyloggers-removal
Comments