Keyblogger is basically a spyware. As indicated by its namesake, it logs or recors your keystrokes. When you type in your username or password, this information is logged and amde available to the hacker. Keyloggers can either be physical or software-based, the latter being more difficult to detect.
A keylogger works in several different ways
- Each keystroke is recorded and immediately dispatched to some remote listener over the internet.
- Keystroke are collected ina temporary file, which is then periodically uploaded to the author's location over the internet.
- The keystrokes are collected in a temporary file, but much like a spam bot, can listen for and recieve instructions from the author. The logger could thus upload the collected information when requested.
- The collected keystrokes could never be uploaded. Instead, if someone has remote access to your machine, or even physical access to your machine, they could simply come by and copy the information manually.
- Finally, the information may not even be kept on your machine. There are keyloggers that include a little flash memory and can be quickly inserted in between installing, the person behind it stops by and picks up the device containing all your information.
There are two methods for bypassing keyloggers, both which involve confusing the logger with random keystrokes. The first, when you need to enter a username or password, is to randomly insert irrelevant numbers and letters in between the same. Once entered, just select the random hits wih the mouse and delete them before logging in. The second is for fooling keyloggers that capture all keystrokes and not just those typed in the password box. Enter your info randomly across the browser and search bars along with random numbers and letters. When you wish to log in, simply copy and paste the relevant bits into the log-in boxes.
You can use KYPS, a reverse proxy server that takes a password, encrypts into a one-time code, printed from the KPYS web site that can be used to log into any computer safely. After being decrypted by the KYPS system and logged in, it deletes the one time code as a password. KYPS also acts as a normal proxy to protect your browsing history. When browsing, it displays the KYPS URL along with random characters and symbols to maximise security.
The " work offline" option shouldn't be relied on too often. This feature is specific to Internet Explorer or the application with that function, and its not too hard for a keylogger to bypass something so narrow. Also, even if you physically pulled out the internet connection wire from your PC, only the first of the above approaches is rendered harmless. The keylogger can still quietly collect the data and transmit it when a connection is available.
As such, there is no way to be 100% carefull against keyloggers. It depends on specific keyloggers most of the time. However, you should always remain careful and cautious when entering a cyber cafe.
Computer is a fast speeding work system. Many uses from this computer, perfect work, it is better than that manual work. Man can do heavy work. Ten men work and eight hours works, that system do it easy in an hour. This is capacity of computer system. So, computer system is very essential. This operating and courses are most important to the all students. Not only it’s need to students but also useful to learn to the old employs.
Computers have brought about a revolution in human life. Computers performed certain mechanical functions. But gradually computers took over different human activities. Now even thinking and problem- solving are being done by computers. They reduced manpowered in administration, business and industry. Speed and accuracy are other advantages. The growing use computer in teaching might one day render teachers, classroom and libraries. Computers are likely to replace human beings in every walk of life.
But every coin has two sides. However, computer can’t replace human beings. Human life is not mechanical affair. They fall in love with each other at first sight. Simple touches of the mother silence a crying baby. Can a computer perform these? Nowadays, teaching is being done by computers. Computers also administer tests, declare results award certificates.
But imagine the difference between the two situations, i.e, sitting before computer and sitting in a classroom with dozens of students around and in the presence of a teacher. The pleasures and pains of companionship, encouraging expressions as he teacher’s face, the direct interaction, eye contact, spontaneous smiles etc., set this living situation. Can a computer give all these?
Thus, despite the many advantages of a computer, wisdom lies in the judiciously using it’s as a tool.
Indian people need less rate computers. That means ordinary people can buy it in cheap cost.
There are lots of Anti virus software available in market today, and all claims to be very much effective and providing 100% protection. Before you choose any Anti virus solution first find out the system requirement. Then you can decide which brand provides all those features. These are some key features of the leading anti virus software available in market.
McAfee VirusScan 13.3
McAfee VirusScan provides powerful integrated technologies to combat and defeat the most sophisticated attacks. McAfee's trusted PC protection blocks removes threats automatically, and identifies spyware and adware before they can run on the system.
McAfee VirusScan Plus AntiVirus, Firewall & AntiSpyware provides the essential protection you need to surf the Web safely. And the McAfee SecurityCenter gives you at-a-glance control over all the McAfee applications.
McAfee VirusScan automatically blocks, cleans, and removes viruses. It blocks spyware before it installs on your computer and removes existing spyware. Also protects and conceals your computer from hackers so that you can surf the Internet safely. Provides advance warning to help you avoid sites which send spam, install adware, or attempt online scams.
Daily updates are installed automatically. When a new version of McAfee is available, you get it automatically at no charge during your subscription. You get 24/7 virus and threat protection from McAfee AVERT Labs, which continuously monitors worldwide virus activities and provides immediate, anti-virus protection and removal solutions.
Kaspersky Internet Security 2010
Kaspersky Internet Security application provides an all-in-one security solution for safe and secure Internet experience. It protects from viruses, Trojans, worms, spyware and adware. It scans files in real time and on demand, also assigns security rating to unknown applications.
Kaspersky Internet Security scans operating system and other installed applications to find malicious software. It detects viruses based on the packers used to compress code. This program restricts access to the user’s resources and data by unknown applications.
Kaspersky Internet Security provides lots of features to protect the internet users. It scans all email messages before you open, protects from the dangers arising instant messengers. It analyzes and closes Internet Explorer vulnerabilities, disables links to fake websites and malware sites. It prevents the theft of data exchanged via secure connections (HTTPS / SSL). This application blocks unauthorized dial-up connections and Cleans up any traces of user activity by deleting temporary files, cookies etc. Also Blocks banners on web pages.
Avast! Home Edition 4.8
Avast! Home Edition provides effective protection against computer viruses, worms, Trojans, adware, spyware and rootkits. It obtained VB100% awards in 2002/3 Virus Bulletin comparative reviews. It’s very much easy to use, just select what you want to scan in which way and press the Play button.
Avast! Home Edition scans all opened files as well as files being read and written, also monitors dangerous actions of viruses. It can be easily integrated with most mail clients and checks both incoming and outgoing mails, it provides heuristic analysis of mail content to protect against new Worms.
It isolates infected and suspicious files to a separate folder. You can download and install updates by simple clicking on the iAVS icon; it can be checked and done automatically when you are On-line.
Kaspersky Virus Removal Tool 7.0
Kaspersky Virus Removal Tool 7.0.0.290 is a freeware that completely removes all types of infections from your computer. It uses effective algorithms of detection and AVZ Antiviral Toolkit.
Kaspersky Virus Removal Tool is not capable for real-time protection of your computer. So, as soon as your computer is cleaned, remove the tool and install a full version of antivirus software.
Kaspersky Virus Removal Tool can be installed to an infected machine in the safe mode. It uses signature detection and heuristic analyzer combined for Integral search and removal of malicious software. Its easy-to-use interface and step by step guidance helps the user.
A firewall is a part of a computer system used to prevent any unauthorized access and allows safe communications. It can be implemented by hardware or software, or combination of both.Each firewall has different kind of authorisation criteria.
The firewall techniques consists of four main types namely
1. Packet filter
2. Application gateway
3.Stateful firewall
4. Proxy server
Packet filter
The data transfer between computers and networks takes place by a basic unit called packets. Packet filter uses a set of user defined rules for identifying the source address, destination address and port number.If a packet matches the rules, the filter either discards it or rejects it. Packet filters are not tough to configure. They are also susceptible to IP spoofing.
Application gateway
They are located between end user and network. The end user contacts the gateway ,after which it performs the required function for the user.Specific programs use specific mechanisms. This type is simple,since it only functions to proxy requests from end users. It also intercepts IP packets from the net.
Stateful firewall
It is used to keep track of the network connections moving across it. It distinguishes legitimate packets for different connections and only allows packets matching a specific connection state. All others will be rejected.This type of firewall is advantageous as opposed to packet filters since it need only check the connection against its table rather than an extensive rule set.
Proxy server
Proxy server is one of the most favourable types, they act as go-betweens for outside clients seeking information from servers.The request is filed and checked according to various filtering rules hence filtering traffic from certain IP addresses. The direct access to the server is subsequently handled by the proxy on the behalf of the clientThe servers are hence kept safe and anontmous from any attack.
Definition of an intranet: A standards-based infrastructure and Internet technologies to support information sharing within a well defined and limited.
Problem: Although an intranet is a private network in which the groups have well-defined and limited is not exempt from attacks that could endanger the information handled, since most of these are caused by their users.
Background: Most of the safety statistics calculated indicate that about 80% of computer-related fraud from internal users, why intranets are most vulnerable to such attacks.
According to the CSI (Computer Security Institute) in San Francisco for 90% of companies surveyed detected attacks on their computers, reported that 70% were the most common viruses, laptop theft and abuse of attacks on the network for its employees.
Model Solution:
1. Security Policy
2. Access Control
3. Secure Transactions
4. Virus
5. Implement Security Number
Presentation of the solution.
6. Security Policy
What are security policies?
Security policies are the documents that describe, mainly, the right way to use the resources of a computer system, the responsibilities and rights of both users and administrators, describing what is to protect and what they're trying to protect these documents are the first step in building effective firewalls. Policies are an essential part of any effective security plan.
How to establish security policies to an intranet.
2. Methodology Development
An outline of security policies must take certain steps to ensure its functionality and stay in the institution. Our proposal is to follow the steps below:
Preparation - It is the collection of all materials related to security issues in the organization:
What I want to protect? Resources: Staff, information, hardware, software, documentation, consumables, etc..
Ask questions related to the external use, for example:
Do you need the protection from external access intranet?
Is granted to authorized users remote access?
How is the unauthorized access to occur soon?
Are there restrictions on access to information important? Etc.
Ask questions related to internal use: for example
What groups, departments or users are restricted in their access to inside information?
What constitutes a breach of internal security?
The security system prevents productivity?
What determines when access happened?
Ask questions concerning the administration
Are plans to implement different levels of access?
Who is authorized to make decisions about security?
Is there a reliable tracking system installed?
Is encryption used? Is it appropriate? Etc.
Who needs to protect? Anyone who poses a threat, whether internal or external to any of these items:
Unauthorized access or to use computer resources without authorization
or damage to information: Amendment or deletion of information in the system
or theft of information: Access to certain information without prior authorization
or dissemination of information: Post details of the system, such as passwords, trade secrets, research, etc..
or denial of service: Forcing the system to deny resources to legitimate users
How many resources am I willing to invest?
How can / should I protect it?
In general, one must ensure that security policies comply with all security services:
Authentication
Confidentiality
Integrity
Non-repudiation
Resources are available to authorized persons
Access Control
Writing - Writing policies in a clear, concise and structured. Requires the work of a team participating in the lawyers, managers, users and administrators.
Edition - Play the policies could be subject to formal review and approval
Adoption - Probably the most difficult part of the process, as it is common for people affected by policies are reluctant to accept. At this stage it is essential to have the support of managers.
Dissemination - To publicize policies to all employees of the organization through video projections, web pages, email, commitment letters, memos, banners, etc..
Review - Policies are subject to review by a committee, to discuss the comments made by those involved.
Implementation - It is worse to have to implement policies and not devoid of them. A policy that cannot be implemented or enforced, has no utility. Must lead by example.
Update-In the required time, policies should be revised and updated to respond to changing circumstances. The ideal time is just after the occurrence of a security incident.
While the policies indicate the "what", the procedures indicate "how". The procedures are allowing us to carry out policies. Examples that require the creation of a procedure are:
Give an account
To register a user
Connect a computer to the network
Locate a computer
Update your operating system
Install software locally or via network
Critical Update software
Export file system
Support and restore information
Manage a security incident
More Articles …
Subcategories
Web Hosting
Web Hosting is a service offered by web hosting providers to the individuals and organizations to make their websites accessible on the internet. Depending on the requirement, one can avail different types of web hosting such as shared hosting, dedicated hosting, virtual private hosting, cloud hosting etc.
Page 116 of 193