SlideShare a Scribd company logo
password cracking and Key logger
Prepared By:
• 1. Dabhi Pragnesh M. (140760109005)
Guided By:- Prof. Richa Mali
Index
 Password cracking
 Key logger and spyware
Password Cracking :
• What is Password?
• Password Cracking Concepts
• Types of Password Attacks
• Application Software Password Cracking
• Hardening the password
What is Password
• String of characters for authentication and log
on computer, web application , software, Files
, network , Mobile phones, and your life 
• Comprises:
[a-zA-z, 0-9, symbols , space]
Password Characteristics
• No short length
• No birthday or phone number, real name ,
company name
• Don’t use complete words or Shakespeare
quotes 
▫ Example:
▫ Hello123: Weak
▫ @(H311l0)@: Strong
▫ Easy to remember, hard to guess
Password Security
• Don’t use your old passwords
• Don’t use working or private email for every
website registration such as games,
news,….etc.
Password Cracking Concept
• guessing or recovering a password
• unauthorized access
• To recover a forgotten password
• A Penetration testing step ( e.g. Network and
Applications)
Type of Password Attacks
 Dictionary Attack
 Brute Force Attack
 Rainbow table attack
 Phishing
 Social Engineering
 Malware
 Offline cracking
 Guess
Password Cracking Types:(Guessing Technique)
I have tried many friends house and even some companies that , their
password was remained as default, admin, admin . (Using Guessing
Techniques)
Password Cracking Types: (Phishing)
Password Cracking Types:(Social Engineering)
 sometimes very lazy genius non-IT Geeks can guess or find out your password
Password Cracking Tools
 Brutus
Remote online cracking tool, Windows base, free, supports:(HTTP, POP3, FTP, SMB, ...etc), resume/pause
option .no recent update but still on top ranking.
 RainbowCrack
Hash cracker tool, windows/linux based, faster than traditional brute force attack, compare both plain text
and hash pairs. Commercial and free version
 Wfuzz
Web application brute forcing (GET and POST), checking (SQL, XSS, LDAP,etc) injection
 Cain and Able ***
Few features of password cracking ability: Syskey Decoder,VNC Password decoder , MS SQl MYSQL and Oracle
password extractor Based64, Credential Manager Password Decoder, Dialup Password Decoder,PWL Cached
Password Decoder, Rainbowcrack-online client, Hash Calculator,
 John the Ripper
Offline mode, Unix/linux based, auto hash password type detector, powerful, contain several built-in
password cracker
 THC Hydra
Dictionary attack tool for many databases, over 30 protocols (e.g. FTP.HTTP,HTPPS,...etc)
 Medusa
 AirCrack-NG
WEP and WPA-PSK keys cracking, faster than other WEP cracker tools
 OphCrack
 L0phtCrack
Password Cracking Types:(Offline Cracking)
 We have enough time to break the password
 Usually take place for big data
 Or very strong and complicated password
 After attack
 Forensics investigation
Password Hardening
 Techniques or technologies which put attacker, cracker or any other malicious
user in difficulties
 Brings password policy
 Increase the level of web,network , application and physical access of to the
company or organization.
 Using biometric technologies such as fingerprint, Eye Detection, RFID Tag
Cards….etc
 All the Security solution just make it more difficulte. Harder but possible
Password Cracking Depends on
 Attacker's strengths
 Attacker's computing resources
 Attacker's knowledge
 Attacker's mode of access [physical or online]
 Strength of the passwords
 How often you change your passwords?
 How close are the old and new passwords?
 How long is your password?
 Have you used every possible combination: alphabets, numbers and special characters?
 How common are your letters, words, numbers or combination?
 Have you used strings followed by numbers or vice versa, instead of mixing them
randomly?
Key logger and spyware
Define Key logger
Hardware Examples
Software Examples
Prevention
What is Keylogging?
Keystroke logging
A program or hardware device that captures every
key depression on the computer
Used to monitor employee performance
Used to seal private information
Malicious Uses…
Besides being used for legitimate purposes,
keyloggers can be hardware installed to a computer
or software that is used to collect sensitive
information.
The types of sensitive information include:
Usernames & Passwords
Credit Card Numbers
Person Information such as Name, Address, etc.
Keylogging Hardware...
These small devices connect directly on the end of
a keyboard to the port on the computer and look
rather unassuming.
At a later time the person who installed the
keylogger can come back to retrieve it. They are
easily removed.
Source:
http://epic.org/privacy/dv/keylogger_hw.gif
Software…
There are hundreds of keylogger programs
available over the internet for download.
There are three ways for an attacker to install the
software on an unsuspecting computer.
1. Install it from a compact disc or floppy disk.
2. Package the software as a computer virus or
trojan horse.
3. Gain access to the computer over a network and
install surveillance software remotely.
Viruses…
A simple search of a virus encyclopedia shows 500
examples of keylogging malware.
Prevention…
There are several ways to prevent Keyloggers:
• Anti-Virus/Spyware & Firewalls
• Automatic Form Fillers
• Alternative Keyboard Layouts
• On screen Keyboards
Anti-Virus/Spyware &
Firewalls...
As with any Virus or Spyware you should make sure
that you have up-to-date protection.
Anti-Virus:
Make sure its running and using the latest virus
definitions.
Anti-Spyware:
Same as your Anti-Virus Software, update regularly.
Firewall:
Make sure its active. It’s the first line of defense
from online intrusions.
AutoForm Fillers…
A common feature of Web Browsers including
Internet Explorer and Firefox.
Works against keyloggers but vulnerable to other
security breaches.
Alternative Keyboard
Layout...
Alternative keyboards make captured keystrokes
look like nonsense
You can customize your own board with Microsoft
Keyboard Layout Creator
On Screen Keyboards...
Software based keyboards are not very effective.
Clicks are converted back to keystrokes.
On Screen Keyboards...
Web-based Keyboards offer more protection and
are often found in online games.
Summary...
Key Loggers record keystrokes:
• Legitimate use: Monitor employee productivity
• Illegal uses: Steal passwords, usernames, and
other personal/corporate data
There are ways to protect yourself:
• Be aware of what’s installed on your computer
• Use caution when surfing the internet
• Keep your computer’s security software
updated

More Related Content

What's hot (20)

PPTX
Computer security
EktaVaswani2
 
DOCX
Final Exam Case Study (3)
Kathy_67
 
PPTX
Two factor authentication 2018
Will Adams
 
PDF
Web Security
Dr.Florence Dayana
 
PPT
Spoofing
Sanjeev
 
PPTX
Password Cracking
Sagar Verma
 
PPTX
CYBER SECURITY
PranjalShah18
 
PPT
Software security
Roman Oliynykov
 
PPTX
Wi-FI Hacking
Mehul Jariwala
 
PPTX
Security & protection in operating system
Abou Bakr Ashraf
 
PPTX
Penetration testing reporting and methodology
Rashad Aliyev
 
PPTX
Password cracking and brute force
vishalgohel12195
 
PPTX
The CIA triad.pptx
GulnurAzat
 
PPTX
Cyber Security in Society
Rubal Sagwal
 
PPTX
Communication security
Sotheavy Nhoung
 
PPTX
Network security
Madhumithah Ilango
 
PPTX
Information Security Lecture #1 ppt
vasanthimuniasamy
 
PPTX
Ethical Hacking
Nitheesh Adithyan
 
PPTX
Steganography
Uttam Jain
 
PPT
Malicious software
msdeepika
 
Computer security
EktaVaswani2
 
Final Exam Case Study (3)
Kathy_67
 
Two factor authentication 2018
Will Adams
 
Web Security
Dr.Florence Dayana
 
Spoofing
Sanjeev
 
Password Cracking
Sagar Verma
 
CYBER SECURITY
PranjalShah18
 
Software security
Roman Oliynykov
 
Wi-FI Hacking
Mehul Jariwala
 
Security & protection in operating system
Abou Bakr Ashraf
 
Penetration testing reporting and methodology
Rashad Aliyev
 
Password cracking and brute force
vishalgohel12195
 
The CIA triad.pptx
GulnurAzat
 
Cyber Security in Society
Rubal Sagwal
 
Communication security
Sotheavy Nhoung
 
Network security
Madhumithah Ilango
 
Information Security Lecture #1 ppt
vasanthimuniasamy
 
Ethical Hacking
Nitheesh Adithyan
 
Steganography
Uttam Jain
 
Malicious software
msdeepika
 

Viewers also liked (20)

PPTX
Manometer
Patel Mit
 
PDF
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Kislaychd
 
PDF
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
PPTX
Ethical Hacking
Pallavi Sonone
 
PPTX
Password craking techniques
أحلام انصارى
 
PDF
Discovering Google Secrets
Steve Yuen
 
PDF
The art of android hacking
Abhinav Mishra
 
PDF
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
andreehuk
 
PDF
Stealing sensitive data from android phones the hacker way
n|u - The Open Security Community
 
PPTX
Manometer
Patel Mit
 
PDF
Hacking Android OS
Jimmy Software
 
PPT
Mobile phone Data Hacking
Md Abu Syeem Dipu
 
PPTX
Password Cracking
Sina Manavi
 
PPTX
Hacking Mobile Apps
Sophos Benelux
 
PPTX
Password Attack
Sina Manavi
 
PPTX
Android Hacking + Pentesting
Sina Manavi
 
PDF
Mobile Hacking
Novizul Evendi
 
PDF
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
GrowthRocks
 
PDF
Intro to White Chapel
Rob Fuller
 
PPTX
password cracking using John the ripper, hashcat, Cain&abel
Shweta Sharma
 
Manometer
Patel Mit
 
Ce Hv6 Module 18 Web Based Password Cracking Techniques
Kislaychd
 
Ceh v5 module 13 web based password cracking techniques
Vi Tính Hoàng Nam
 
Ethical Hacking
Pallavi Sonone
 
Password craking techniques
أحلام انصارى
 
Discovering Google Secrets
Steve Yuen
 
The art of android hacking
Abhinav Mishra
 
Growth Hacking For Mobile - Hack 2 Validate & Hack 2 Grow
andreehuk
 
Stealing sensitive data from android phones the hacker way
n|u - The Open Security Community
 
Manometer
Patel Mit
 
Hacking Android OS
Jimmy Software
 
Mobile phone Data Hacking
Md Abu Syeem Dipu
 
Password Cracking
Sina Manavi
 
Hacking Mobile Apps
Sophos Benelux
 
Password Attack
Sina Manavi
 
Android Hacking + Pentesting
Sina Manavi
 
Mobile Hacking
Novizul Evendi
 
Grow Hack Athens Pt.1: Growth Hacking For Web Apps
GrowthRocks
 
Intro to White Chapel
Rob Fuller
 
password cracking using John the ripper, hashcat, Cain&abel
Shweta Sharma
 
Ad

Similar to password cracking and Key logger (20)

PPTX
Password cracking and brute force tools
zeus7856
 
PPT
Aiman
Aimanz
 
PPTX
Cybersecurity Essentials - Part 2
Shobhit Sharma
 
PPTX
secure from Phishing Hacking and Keylogger
Abhishek Hirapara
 
DOCX
Password Cracking
Hajer alriyami
 
DOCX
Password hacking
Abhay pal
 
PPT
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
ajajkhan16
 
PPTX
Hacking and cracking
Deepak kumar
 
PPTX
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
PPTX
Key logger,Why? and How to prevent Them?
Bibek Sharma
 
PPTX
Gamifying Ethical hacking for education.pptx
yg5ptrdvbg
 
PPTX
Cybersecurity cyberlab1
rayborg
 
PPTX
Hacking
Nadeem Ahmad
 
PPTX
Hacking
Nadeem Ahmad
 
PPTX
ch 3 Tools and methods used in Cybercrime.pptx
jpsarwade
 
PPTX
Personal Internet Security System
Matthew Bricker
 
ODP
Security In Internet Banking
Chiheb Chebbi
 
PPT
Keyloggers.ppt
Chetanmalviya8
 
PPT
Keyloggers and Spywares
Ankit Mistry
 
PPTX
Hacking
Mohit Agarwal
 
Password cracking and brute force tools
zeus7856
 
Aiman
Aimanz
 
Cybersecurity Essentials - Part 2
Shobhit Sharma
 
secure from Phishing Hacking and Keylogger
Abhishek Hirapara
 
Password Cracking
Hajer alriyami
 
Password hacking
Abhay pal
 
Unit-4 Cybercrimes-II Mobile and Wireless Devices.ppt
ajajkhan16
 
Hacking and cracking
Deepak kumar
 
Ethical hacking for Business or Management.pptx
FarhanaMariyam1
 
Key logger,Why? and How to prevent Them?
Bibek Sharma
 
Gamifying Ethical hacking for education.pptx
yg5ptrdvbg
 
Cybersecurity cyberlab1
rayborg
 
Hacking
Nadeem Ahmad
 
Hacking
Nadeem Ahmad
 
ch 3 Tools and methods used in Cybercrime.pptx
jpsarwade
 
Personal Internet Security System
Matthew Bricker
 
Security In Internet Banking
Chiheb Chebbi
 
Keyloggers.ppt
Chetanmalviya8
 
Keyloggers and Spywares
Ankit Mistry
 
Hacking
Mohit Agarwal
 
Ad

Recently uploaded (20)

PPTX
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
PPTX
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
PPTX
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
PPTX
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PDF
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
PPTX
Introduction to Design of Machine Elements
PradeepKumarS27
 
PPTX
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
PPTX
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
PDF
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
PDF
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
PDF
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
DOCX
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
PDF
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
PPTX
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
PDF
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
PDF
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
PDF
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
PPTX
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
PPTX
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 
Mechanical Design of shell and tube heat exchangers as per ASME Sec VIII Divi...
shahveer210504
 
原版一样(Acadia毕业证书)加拿大阿卡迪亚大学毕业证办理方法
Taqyea
 
Server Side Web Development Unit 1 of Nodejs.pptx
sneha852132
 
DATA BASE MANAGEMENT AND RELATIONAL DATA
gomathisankariv2
 
PORTFOLIO Golam Kibria Khan — architect with a passion for thoughtful design...
MasumKhan59
 
Introduction to Design of Machine Elements
PradeepKumarS27
 
artificial intelligence applications in Geomatics
NawrasShatnawi1
 
Element 11. ELECTRICITY safety and hazards
merrandomohandas
 
Viol_Alessandro_Presentazione_prelaurea.pdf
dsecqyvhbowrzxshhf
 
Ethics and Trustworthy AI in Healthcare – Governing Sensitive Data, Profiling...
AlqualsaDIResearchGr
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
AI TECHNIQUES FOR IDENTIFYING ALTERATIONS IN THE HUMAN GUT MICROBIOME IN MULT...
vidyalalltv1
 
CS-802 (A) BDH Lab manual IPS Academy Indore
thegodhimself05
 
Pressure Measurement training for engineers and Technicians
AIESOLUTIONS
 
MobileComputingMANET2023 MobileComputingMANET2023.pptx
masterfake98765
 
GTU Civil Engineering All Semester Syllabus.pdf
Vimal Bhojani
 
Water Industry Process Automation & Control Monthly July 2025
Water Industry Process Automation & Control
 
Biomechanics of Gait: Engineering Solutions for Rehabilitation (www.kiu.ac.ug)
publication11
 
Shinkawa Proposal to meet Vibration API670.pptx
AchmadBashori2
 
What is Shot Peening | Shot Peening is a Surface Treatment Process
Vibra Finish
 

password cracking and Key logger

  • 2. Prepared By: • 1. Dabhi Pragnesh M. (140760109005) Guided By:- Prof. Richa Mali
  • 3. Index  Password cracking  Key logger and spyware
  • 4. Password Cracking : • What is Password? • Password Cracking Concepts • Types of Password Attacks • Application Software Password Cracking • Hardening the password
  • 5. What is Password • String of characters for authentication and log on computer, web application , software, Files , network , Mobile phones, and your life  • Comprises: [a-zA-z, 0-9, symbols , space]
  • 6. Password Characteristics • No short length • No birthday or phone number, real name , company name • Don’t use complete words or Shakespeare quotes  ▫ Example: ▫ Hello123: Weak ▫ @(H311l0)@: Strong ▫ Easy to remember, hard to guess
  • 7. Password Security • Don’t use your old passwords • Don’t use working or private email for every website registration such as games, news,….etc.
  • 8. Password Cracking Concept • guessing or recovering a password • unauthorized access • To recover a forgotten password • A Penetration testing step ( e.g. Network and Applications)
  • 9. Type of Password Attacks  Dictionary Attack  Brute Force Attack  Rainbow table attack  Phishing  Social Engineering  Malware  Offline cracking  Guess
  • 10. Password Cracking Types:(Guessing Technique) I have tried many friends house and even some companies that , their password was remained as default, admin, admin . (Using Guessing Techniques)
  • 12. Password Cracking Types:(Social Engineering)  sometimes very lazy genius non-IT Geeks can guess or find out your password
  • 13. Password Cracking Tools  Brutus Remote online cracking tool, Windows base, free, supports:(HTTP, POP3, FTP, SMB, ...etc), resume/pause option .no recent update but still on top ranking.  RainbowCrack Hash cracker tool, windows/linux based, faster than traditional brute force attack, compare both plain text and hash pairs. Commercial and free version  Wfuzz Web application brute forcing (GET and POST), checking (SQL, XSS, LDAP,etc) injection  Cain and Able *** Few features of password cracking ability: Syskey Decoder,VNC Password decoder , MS SQl MYSQL and Oracle password extractor Based64, Credential Manager Password Decoder, Dialup Password Decoder,PWL Cached Password Decoder, Rainbowcrack-online client, Hash Calculator,  John the Ripper Offline mode, Unix/linux based, auto hash password type detector, powerful, contain several built-in password cracker  THC Hydra Dictionary attack tool for many databases, over 30 protocols (e.g. FTP.HTTP,HTPPS,...etc)  Medusa  AirCrack-NG WEP and WPA-PSK keys cracking, faster than other WEP cracker tools  OphCrack  L0phtCrack
  • 14. Password Cracking Types:(Offline Cracking)  We have enough time to break the password  Usually take place for big data  Or very strong and complicated password  After attack  Forensics investigation
  • 15. Password Hardening  Techniques or technologies which put attacker, cracker or any other malicious user in difficulties  Brings password policy  Increase the level of web,network , application and physical access of to the company or organization.  Using biometric technologies such as fingerprint, Eye Detection, RFID Tag Cards….etc  All the Security solution just make it more difficulte. Harder but possible
  • 16. Password Cracking Depends on  Attacker's strengths  Attacker's computing resources  Attacker's knowledge  Attacker's mode of access [physical or online]  Strength of the passwords  How often you change your passwords?  How close are the old and new passwords?  How long is your password?  Have you used every possible combination: alphabets, numbers and special characters?  How common are your letters, words, numbers or combination?  Have you used strings followed by numbers or vice versa, instead of mixing them randomly?
  • 17. Key logger and spyware Define Key logger Hardware Examples Software Examples Prevention
  • 18. What is Keylogging? Keystroke logging A program or hardware device that captures every key depression on the computer Used to monitor employee performance Used to seal private information
  • 19. Malicious Uses… Besides being used for legitimate purposes, keyloggers can be hardware installed to a computer or software that is used to collect sensitive information. The types of sensitive information include: Usernames & Passwords Credit Card Numbers Person Information such as Name, Address, etc.
  • 20. Keylogging Hardware... These small devices connect directly on the end of a keyboard to the port on the computer and look rather unassuming. At a later time the person who installed the keylogger can come back to retrieve it. They are easily removed. Source: http://epic.org/privacy/dv/keylogger_hw.gif
  • 21. Software… There are hundreds of keylogger programs available over the internet for download. There are three ways for an attacker to install the software on an unsuspecting computer. 1. Install it from a compact disc or floppy disk. 2. Package the software as a computer virus or trojan horse. 3. Gain access to the computer over a network and install surveillance software remotely.
  • 22. Viruses… A simple search of a virus encyclopedia shows 500 examples of keylogging malware.
  • 23. Prevention… There are several ways to prevent Keyloggers: • Anti-Virus/Spyware & Firewalls • Automatic Form Fillers • Alternative Keyboard Layouts • On screen Keyboards
  • 24. Anti-Virus/Spyware & Firewalls... As with any Virus or Spyware you should make sure that you have up-to-date protection. Anti-Virus: Make sure its running and using the latest virus definitions. Anti-Spyware: Same as your Anti-Virus Software, update regularly. Firewall: Make sure its active. It’s the first line of defense from online intrusions.
  • 25. AutoForm Fillers… A common feature of Web Browsers including Internet Explorer and Firefox. Works against keyloggers but vulnerable to other security breaches.
  • 26. Alternative Keyboard Layout... Alternative keyboards make captured keystrokes look like nonsense You can customize your own board with Microsoft Keyboard Layout Creator
  • 27. On Screen Keyboards... Software based keyboards are not very effective. Clicks are converted back to keystrokes.
  • 28. On Screen Keyboards... Web-based Keyboards offer more protection and are often found in online games.
  • 29. Summary... Key Loggers record keystrokes: • Legitimate use: Monitor employee productivity • Illegal uses: Steal passwords, usernames, and other personal/corporate data There are ways to protect yourself: • Be aware of what’s installed on your computer • Use caution when surfing the internet • Keep your computer’s security software updated

Editor's Notes

  • #12: Using Fake pages or application
  • #19: Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others. Source: Wikipedia
  • #20: People who install keyloggers are interested in your information. Once they have it they can steal your identity and ruin your credit which can then take years and money in order to clear your name. People may also install these devices for commercial espionage to steal a company’s plans for a new product.
  • #21: Because your keyboard plugs in the back of your machine, a device like this can go unnoticed for a long time and can even look like they belong there. The only obstacle for the person installing the hardware is getting access to your computer. Depending whether or not the computer is in a public place it could be rather easy.
  • #22: Installing from a disk is the hardest way for an attacker to install the software, like with the hardware, they have to have physical contact with a users machine.
  • #23: Installing a Keylogger via virus or trojan horse is an effective and easy way to deliver the program. It could be installed and running on your computer without you even knowing.
  • #25: Most computers come with demo’s of Anti-Virus software and allow you to purchase a license for a full version. Free protection is also available for download, such as AVG Free. Most come with an automatic update feature to keep you current. As with Anti-Virus Software you can buy or download free versions of Ant-Spyware, sometimes called Anti-Malware. Free utilities include Windows Defender and Ad-Aware. A firewall's basic task is to control traffic between computer networks with different zones of trust. Windows comes with a firewall utility and others, such as ZoneAlarm, can be downloaded for free. Firewalls keep intruders out.
  • #26: Internet Explorer and other web browser come with the option to complete forms, usernames and passwords automatically. Although this is good at preventing keyloggers from viewing your information, there are other ways people can access information stored by the autoform feature.
  • #27: Because most keyloggers expect you to be using the standard keyboard, using an alternative layout will make the data any keylogger intercepts as gibberish, unless they can convert it.
  • #28: Software not 100% effective because most of these programs convert the mouse click into a keyboard event message that must be sent to the external target program to type text, like the version that comes with Windows XP.
  • #29: Web-based on-screen keyboards may provide some degree of protection. The game Maple Story uses a 4-digit Pin Code secured by both on-screen keyboard entry and a randomly changing button pattern; there is no real way to get the latter information without logging the screen and mouse movements; another MMORPG called RuneScape makes a similar system available for players to protect their in-game bank accounts with. Source: Wikipedia