ElaKiri Community
Downloads
Go Back   ElaKiri Community > General > ElaKiri PRO!
Reload this Page How to Protect from Hackers ( Keyloggers)
Reply
 
Thread Tools
(#1)
Old
tharakato's Avatar
tharakato tharakato is offline
Senior Member
tharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of lighttharakato is a glorious beacon of light
 
Posts: 9,280
Join Date: Jul 2007
Location: Sri Lanka
Up How to Protect from Hackers ( Keyloggers) - 10-29-2009, 06:30 PM

Keylogger spyware, also known as a keystroke logger, is a software application that captures and records each and every keystroke that is typed on your keyboard. Keylogger software was originally developed for positive, productive uses such as diagnosing problems with a computer system, measuring employee productivity and retrieving lost or deleted data. However, hackers and other cyber criminals have since adapted it for unscrupulous purposes such as phishing and other identity theft.

Here's how to protect your PC system and personal information from Keylogger spyware
.


Step 1


Enable your firewalls. This is especially important if you are hooked up to a DSL/Broadband connection. Firewalls are designed to prevent outside access to your computer. Being constantly connected to the Internet makes you even more vulnerable to keylogging hackers. A firewall won't stop the keylogger in a literal sense, but it may help prevent the transmission of the information back to the hacker.




Step 2
install anti-spyware and anti-virus software (& Also a good firewall). Keylogger spyware often invades your PC system via viruses, Trojans and other malware. Your anti-spyware and antiviral are your first line of defense. A number of open-source and commercial applications are available online, to clean out any keyloggers that they detect.

Step 3


Obtain and use an automated form-filler, particularly if you often enter personal or financial information at any website. These form fillers encrypt and save this confidential information and automatically fill it in, so you won't have to type it in.

Step 4


Keep track of the programs that are running on your computer. Keyloggers tend to run in the background, out of sight. You can check the programs via the Task Manager by pressing (Ctrl + Alt + Delete). Your USB port and computer games such as the PS2 have been used to install keylogger software.






"Think Like a Hacker" Its the Best Way to to Protect yourself from Hackers
Reply With Quote
(#2)
Old
shanukya's Avatar
shanukya shanukya is offline
Junior Member
shanukya is an unknown quantity at this point
 
Posts: 17
Join Date: Dec 2007
Location: Padukka
Send a message via Skype™ to shanukya
10-29-2009, 06:37 PM

ok
Reply With Quote
Reply

Bookmarks

Thread Tools

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is Off

Forum Jump



Copyright © 2006 - 2011 ElaKiri™ Beta2.Evo vBulletin, vBa iBproArcade Subdreamer I-Magic MKv
Optimisation plugin by DBtech

Page generated in 0.05400 seconds with 8 queries