Which Anti Virus

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 6 April 2013

How To Protect Your Computer From Keyloggers

Posted on 19:32 by Unknown


A keylogger is a small program that stores each keystroke a user types on a specific computer's keyboard. It is capable to send log files by email or via FTP. 
Now the question is how to protect your computer system to get affected by keyloggers, keep in mind the sender of the file force you to click on it. So be careful while receiving a file from unknown person or even a known person. 

You can get affected by vising untrustworthy web site. Some sites may have code in them that exploit your web browser and cause it to quietly install a keylogging application without your permission. (Note: even turstworthy sites can be hacked! The same hackers who are after your information can hack what you think of as trustworthy sites and add exploit code to them which could give you a keylogger.) 

Here is the major steps to fight against keylogger: 

Use a good AntiVirus 
Keep your operating system up-to-date. 
Install firewall software that prevents any unauthorized access between your computer and the Internet. Comodo is recommended. Again, its free and well regarded. 
Get a virus scanner. Grisoft provides one for free. Be sure to configure it to scan your system regularly and to check for updates. 
Get a free anti-spyware program and run it. Spy Sweeper is a good one. As with your anti-virus software, be sure to configure it to scan your system regularly and check for updates. 
Be sure to run the latest version of your browser software 
Be careful downloading files! While your anti-virus and anti-spyware software should catch anything that gets installed, it's better to catch them before they get installed and have a chance to cause damage. Never download files from sites you don't trust and be wary of opening unexpected e-mail attachments. 
Use Antilogger like Zemana 
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Hacking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Online Mobile Recharge Websites
    Hey here is the list of websites which helps you to make a online recharge of your mobile. Rechargeitnow.com FastRecharge.com Indiamobilerec...
  • GTU Paper Solution and Material as Per GTU syllabus
    Go to this website and download the Study material of GTU Syllabus. http://gtu-paper.blogspot.com/
  • C Program Library files(Header Files)
    1. <stdio.h>: input and output  function in program. 2. <conio.h>: to clear screen and  pause information function. 3. <ctype...
  • Windows 8 - Keyboard shortcuts
    Press this key To do this Right Shift for eight seconds Turn Filter Keys on and off Left Alt+Left Shift+PrtScn (or PrtScn) Turn High Contras...
  • How To Install Android on PC or Laptop
    Android has a got very important place in our Tech World.Now in market you can get many devices running on Android like Smartphones to Table...
  • HOW TO : Speed Up Youtube Buffering Speed
    1. Click start then type  system.ini  in the input address box 2. Then you will see the file  system.ini,  click it and it will open in a no...
  • Different Operating System and Their RAM Support
    Windows 8 64 bit Enterprise  Professional : 512 GB Windows 8 64 bit :128 GB Windows 8 32 bit : 4 GB Windows 7 64 bit Ultimate, Enterprise ...
  • Make Calculator Yourself using java.
    write a following code in netbeans IDE 7.1 and save file as calc.java and run it and you will have your own calculator...  /*  * To change t...
  • How To recover Saved Password In Firefox ?
    1. Open Firefox Web Broweser 2. Then Click on FireFox > Option > Option as shown in below picture 3. Then a POP Up box will appear, In...
  • How To Check Antivirus Strength or Test Antivirus Software or Check Antivirus Which is Used by You is Good or Worst?
    One of the most asked question is  Which antivirus has good strength or How to check antivirus strength? This post is for them who want to c...

Categories

  • Android
  • Android Apps
  • apps
  • BlackBerry
  • Cprog
  • dfd
  • erd
  • Facebook
  • general
  • Hacking
  • HTC
  • ios
  • java
  • Mobile
  • nokia
  • Samsung
  • Srs
  • Window Apps
  • Windows 8

Blog Archive

  • ▼  2013 (91)
    • ►  November (6)
    • ►  October (5)
    • ►  September (17)
    • ►  August (3)
    • ►  July (8)
    • ►  June (13)
    • ►  May (12)
    • ▼  April (27)
      • Windows 8 - Keyboard shortcuts
      • HTC 8x
      • Cool Wallpapers HD : Get it free
      • Gun N Strike Terrorist : Get it free
      • Temple Run For Windows Mobile
      • BOUNDRY_FILL ALGORITHM
      • E-R Diagram For Airlines Reservation System
      • E-R Diagram For Hospital Management System
      • Bypass School/College/Office Firewall
      • How to Hackers Erase Tracks After Hacking
      • Creating a fake ( Phishing ) page of gmail,faceboo...
      • Recover Password Of --> Linux Ubuntu , Windows XP,...
      • A Virus Program to Restart the Computer at Every S...
      • How To Protect Your Computer From Keyloggers
      • How to get a admin account on a school / Collage PC
      • Increase Firefox Surfing Speed
      • Blocking Ultrasurf with a Sonicwall Firewall
      • Hacking Aspx / Php websites (ACTIVE SQL INJECTION)
      • Will Facebook’s phone gamble with ANDROID / WINDOW...
      • HOW TO : Speed Up Youtube Buffering Speed
      • SRS For Hospital Management System
      • SRS for Library Management System
      • Hack Your Modem and Increase Your Download Speed
      • BlackBerry Z10 coming soon with WXGA resolution
      • Samsung Galaxy Pocket Neo and Galaxy Star with Jel...
      • Loop Mobile DND | Activate Loop Mobile Do Not Dist...
      • Hacking Cyberoam(Bypassing)
Powered by Blogger.

About Me

Unknown
View my complete profile