- Back to Home »
- windows tricks »
- Keyloggers And How To Be Safe From Keyloggers
Posted by : Unknown
In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of keylogger and how to be safe from keyloggers. So lets learn something about keyloggers.
1. What is keylogger ?
You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.2. How it can harm you ?
In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.
- Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.
3. Types of keyloggers
There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.
HARDWARE KEYLOGGER
SOFTWARE KEYLOGGER
4. How to Protect yourself from keyloggers ?
Keylogger can be used by your enemy to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.
- Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
- You can even use above method to protect your facebook profile, yahoo or gmail id.
- When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.
Categories
Blog Archive
-
2014
(79)
- August (1)
- June (5)
- May (20)
-
April
(43)
- Basic Terminal Commands For Linux
- Websites To Learn Computer Programming Languages
- Keyloggers And How To Be Safe From Keyloggers
- 6 Most Common Password Cracking Methods And Their ...
- What Is Phishing And How To Be Safe From Phishing ?
- Remove All Your Google Web History
- Hide Files Behind The Images
- Best Call Recorder for iPhone to Record Conversations
- jailbreak iDevice running iOS 7 using evasi0n7 [Wi...
- Add Folders and Software to My Computer in Windows...
- Make any Window transparent using a keyboard Short...
- Get Taskbar transparency in Windows 8
- View India in 360 with WoNoBo.com or with there An...
- How to Block Ads on Android Apps, Games and Browser’s
- Retrieve Your Wireless Network Security Key in Win...
- Use Alternate DNS Servers In Windows For Faster In...
- Use The Google Chrome Flash Plugin in Firefox in U...
- Encrypt Your Flash Drives In Ubuntu Linux Using Di...
- Use Google Chrome As The Default PDF Viewer In Ubuntu
- Change the GNOME Keyring Password For Easier Autom...
- Add a New Default Search Engine To Google Chrome W...
- Change the Default LightDM Background Image In Ubuntu
- Turn Off The Startup Sound In Windows Vista and Wi...
- Find, View and Analyze BSOD Dump Files
- Disable Aero (Permanently or Temporarily) in Windo...
- Change the Windows 7 Login Image without Editing t...
- Getting Started With Google Drive For Windows
- Use Google Web Fonts in the Google Docs Word Proce...
- Merge Two Partitions in Windows
- Change Where Chrome Downloads Files To
- View Photo EXIF Metadata on iPhone, Mac, and Windows
- Track Your iPhone, iPad, and Mac Computer
- Remove Duplicate Contacts on iPhone
- Create a Multiple Operating System Bootable USB Drive
- Guide to Taking Screenshots in Windows 8
- 99 Ways to Make Your Computer Fast
- Tips to Avoid Installing Browser Extensions with A...
- Some methods to Make Sure No One is Monitoring You...
- Get back the corrupted files in pendrive without a...
- Download YouTube videos using VLC media player wit...
- HIDE A FOLDER IN NOKIA PHONE WITHOUT ANY SOFTWARE
- Some Common Internet Error Codes With Meanings
- CCleaner is Now Available for Android
- March (10)