Which Anti Virus

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Saturday, 6 April 2013

How To Protect Your Computer From Keyloggers

Posted on 19:32 by Unknown


A keylogger is a small program that stores each keystroke a user types on a specific computer's keyboard. It is capable to send log files by email or via FTP. 
Now the question is how to protect your computer system to get affected by keyloggers, keep in mind the sender of the file force you to click on it. So be careful while receiving a file from unknown person or even a known person. 

You can get affected by vising untrustworthy web site. Some sites may have code in them that exploit your web browser and cause it to quietly install a keylogging application without your permission. (Note: even turstworthy sites can be hacked! The same hackers who are after your information can hack what you think of as trustworthy sites and add exploit code to them which could give you a keylogger.) 

Here is the major steps to fight against keylogger: 

Use a good AntiVirus 
Keep your operating system up-to-date. 
Install firewall software that prevents any unauthorized access between your computer and the Internet. Comodo is recommended. Again, its free and well regarded. 
Get a virus scanner. Grisoft provides one for free. Be sure to configure it to scan your system regularly and to check for updates. 
Get a free anti-spyware program and run it. Spy Sweeper is a good one. As with your anti-virus software, be sure to configure it to scan your system regularly and check for updates. 
Be sure to run the latest version of your browser software 
Be careful downloading files! While your anti-virus and anti-spyware software should catch anything that gets installed, it's better to catch them before they get installed and have a chance to cause damage. Never download files from sites you don't trust and be wary of opening unexpected e-mail attachments. 
Use Antilogger like Zemana 
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Hacking | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Different Types Of Computer Ports
  • C Program Library files(Header Files)
    1. <stdio.h>: input and output  function in program. 2. <conio.h>: to clear screen and  pause information function. 3. <ctype...
  • Features Of Android KitKat
    1) The new Phone (Dialer) app is now linked online with Google Maps. This means if your type Big Bazaar in Phone app (Not Search) and if tha...
  • Free Download E-DRAW MAX
    link 1 : http://hotfile.com/dl/ 254163134/8de2252/EDM.rar.html
  • Different Operating System and Their RAM Support
    Windows 8 64 bit Enterprise  Professional : 512 GB Windows 8 64 bit :128 GB Windows 8 32 bit : 4 GB Windows 7 64 bit Ultimate, Enterprise ...
  • How To Protect Your Computer From Keyloggers
    A keylogger is a small program that stores each keystroke a user types on a specific computer's keyboard. It is capable to send log file...
  • GTU Paper Solution and Material as Per GTU syllabus
    Go to this website and download the Study material of GTU Syllabus. http://gtu-paper.blogspot.com/
  • Online Mobile Recharge Websites
    Hey here is the list of websites which helps you to make a online recharge of your mobile. Rechargeitnow.com FastRecharge.com Indiamobilerec...
  • How To Install Android on PC or Laptop
    Android has a got very important place in our Tech World.Now in market you can get many devices running on Android like Smartphones to Table...
  • How to Get Maximum Battery Life in Laptop?
    1. Backlight Levels/ Screen Brightness. ------------------------------ -------------------- You don’t always need the brightest screen for u...

Categories

  • Android
  • Android Apps
  • apps
  • BlackBerry
  • Cprog
  • dfd
  • erd
  • Facebook
  • general
  • Hacking
  • HTC
  • ios
  • java
  • Mobile
  • nokia
  • Samsung
  • Srs
  • Window Apps
  • Windows 8

Blog Archive

  • ▼  2013 (91)
    • ►  November (6)
    • ►  October (5)
    • ►  September (17)
    • ►  August (3)
    • ►  July (8)
    • ►  June (13)
    • ►  May (12)
    • ▼  April (27)
      • Windows 8 - Keyboard shortcuts
      • HTC 8x
      • Cool Wallpapers HD : Get it free
      • Gun N Strike Terrorist : Get it free
      • Temple Run For Windows Mobile
      • BOUNDRY_FILL ALGORITHM
      • E-R Diagram For Airlines Reservation System
      • E-R Diagram For Hospital Management System
      • Bypass School/College/Office Firewall
      • How to Hackers Erase Tracks After Hacking
      • Creating a fake ( Phishing ) page of gmail,faceboo...
      • Recover Password Of --> Linux Ubuntu , Windows XP,...
      • A Virus Program to Restart the Computer at Every S...
      • How To Protect Your Computer From Keyloggers
      • How to get a admin account on a school / Collage PC
      • Increase Firefox Surfing Speed
      • Blocking Ultrasurf with a Sonicwall Firewall
      • Hacking Aspx / Php websites (ACTIVE SQL INJECTION)
      • Will Facebook’s phone gamble with ANDROID / WINDOW...
      • HOW TO : Speed Up Youtube Buffering Speed
      • SRS For Hospital Management System
      • SRS for Library Management System
      • Hack Your Modem and Increase Your Download Speed
      • BlackBerry Z10 coming soon with WXGA resolution
      • Samsung Galaxy Pocket Neo and Galaxy Star with Jel...
      • Loop Mobile DND | Activate Loop Mobile Do Not Dist...
      • Hacking Cyberoam(Bypassing)
Powered by Blogger.

About Me

Unknown
View my complete profile