Вы находитесь на странице: 1из 2

Key Loggers, like the name suggests, are programs that record keystrokes from th e computer keyboard and

either logs it to the computer or sends it to its maker through a built in e-mail engine. Key logging allows a prospective hacker to gai n access to the user name, passwords, and even id numbers entered into sensitive online bank accounts or passwords to remote control programs. You can find the list of latest keyloggers here http://www.keylogger.org Use PSMantiKeylogger to check if your computer has any keyloggers installed, you can get it here http://psmantikeyloger.sourceforge.net/prod03.htm Here are a few other ways to be safe from harmful effects of key loggers * Monitoring what programs are running A user should constantly observe the programs which are installed on his or her machine. Also, devices connected to PS/2 and USB ports (which have both been hac ked) can be used to secretly install a keylogger and then remove it (along with the user s data) by the perpetrator. * Anti-spyware Anti-spyware applications are able to detect many keyloggers and cleanse them. R esponsible vendors of monitoring software support detection by anti-spyware prog rams, thus preventing abuse of the software. * Firewall Enabling a firewall does not stop keyloggers per se, but can possibly prevent tr ansmission of the logged material over the net if properly configured. * Network monitors Network monitors (also known as reverse-firewalls) can be used to alert the user whenever an application attempts to make a network connection. This gives the u ser the chance to prevent the keylogger from phoning home with his or her typed in formation. * Anti-keylogging software Keylogger detection software is also available. Some of this type of software us e signatures from a list of all known keyloggers. The PC s legitimate users can then periodically run a scan from this list, and the software looks for the items fr om the list on the hard-drive. One drawback of this approach is that it only pro tects from keyloggers on the signature-based list, with the PC remaining vulnera ble to other keyloggers. Other detection software doesn t use a signature list, but instead analyzes the wo rking methods of many modules in the PC, allowing it to block the work of many d ifferent types of keylogger. One drawback of this approach is that it can also b lock legitimate, non-keylogging software. Some heuristics-based anti-keyloggers have the option to unblock known good software, but this can cause difficulties for inexperienced users. * One-time passwords (OTP) Using one-time passwords is completely keylogger-safe because the recorded passw

ord is always invalidated right after it s used. This solution is useful if you ar e often using public computers where you can t verify what is running on them. One -time passwords also prevents replay attacks where an attacker uses the old info rmation to impersonate. One example is online banking where one-time passwords a re implemented and prevents the account from keylogging attacks as well as repla y attacks. * Automatic form filler programs Automatic form-filling programs can prevent keylogging entirely by not using the keyboard at all. Form fillers are primarily designed for web browsers to fill i n checkout pages and log users into their accounts. Once the user s account and cr edit card information has been entered into the program, it will be automaticall y entered into forms without ever using the keyboard or clipboard, thereby reduc ing the possibility that private data is being recorded. (Someone with access to browser internals and/or memory can often still get to this information; if SSL is not used, network sniffers and proxy tools can easily be used to obtain priv ate information too.) It is important to generate passwords in a fashion that is invisible to keylogge rs and screenshot utilities. Using a browser integrated form filler and password generator that does not just pop up a password on the screen is therefore key. Programs that do this can generate and fill passwords without ever using the key board or clipboard. * Drag & Drop Most keyloggers cannot intercept texts which are drag & dropped from one window to another[citation needed][dubious discuss]. With the help of this technique, s ensitive data could be transferred, for example, from a password manager to the target application[citation needed]. * Non-technological methods Most keyloggers can be fooled by alternating between typing the login credential s and typing characters somewhere else in the focus window. Similarly, one can m ove their cursor using the mouse during typing, causing the logged keystrokes to be in the wrong order. One can also use context menus to remove, copy, cut and paste parts of the typed text without using the keyboard. Another very similar technique utilizes the fact that any selected text portion is replaced by the next key typed. E.g. if the password is secret , one could type s , then some dummy keys asdfsd . Then these dummies could be selected with mouse, and next character from the password e is typed, which replaces the dummies asdfsd .

Вам также может понравиться