Home >> Articles >> Article
  Login | Signup  

Articles from the members

Category
  General Knowledge   Career Counselling   Technology
  Power of Creator   Religious   Moral Story
  Medical   Kids   Sports
  Quran & Science   Politics   Poetry
  Funny / Jokes   Video   Golden Old Days - ம‌ல‌ரும் நினைவுக‌ள்
  Others   சுய தொழில்கள்
 
Protect your password in cyber cafe and on public computers:
Posted By:Hajas On 12/18/2006


Protect your password in cyber cafe and on public computers:
 
Some time or the other, you must have used cyber dafe or public computers to access internet or mail.
Public computers are most prone to password hacking. Anyone can simply install a keylogger software to hack your password.
Keylogging is one of the most insidious threats to a user's personal information. Passwords, credit card numbers etc.
It is now very easy for the keylogger to harvest passwords.  Each and every keystroke (whatever you type on the keyboard) gets recorded in the keylogger software and the person installing it can easily view what you have typd in.
For example, if you go to hotmail.com  and check your mails. Say your ID is  sarahj7@hotmail. com and password is snoopy2. the keylogger software records your usename and password in its log file as
Microsoft Internet Explorer :
Or
Firefox:
 
Risky isnt it???!!!
There's solution to this problem and you can easily fool the hacker.
The keylogger software sees and records everything,but it doesn't understand what it sees. I
t does not know what to do with keys that are typed anywhere other than the password or user name fields. 
So,between successive keys of the password if you enter random keys, the keylogger software wont ever come to konw where you typed in what..
In the process of recording the keys, the string that the keylogger receives will contain the password, but embedded in so much random junk that discovering it is infeasible.
So...
1.Go to hotmail.com or yahoo.com or any of the site where you need to insert a password or PIN. 
2.Type in your user ID.
3. Type in the first characterof the password.
4. Click on the address bar in the internet explorer or Firefox. Type in some 3/4 random charachters.
5. Again go to password field and type in the second character of the password.And probably third too.
6. Again go to the addressbar and type in a few mroe random character.
7. Back to the password field and the next characters of the password.
Keep on repeatin the process till you type in the full password in the password field.
 
Instead of the password
snoopy2 the keylogger now gets:
hotmail.comspqmlain sdgsosdgfsodgfdp uouuyhdg2
Here a total of 26 random characters have been inserted among the 7 characters of the actual password!!!
 
 
No doubt it takes a little bit of more time than the usual process, but you're safe and secure that way!!!



Technology
Date Title Posted By
7/15/2017 12:21:13 PMஹைப்பர் லூப் என்றால் என்னHajas
6/10/2014 3:57:55 AMமழைநீர் சேகரிப்புHajas
9/10/2013 9:39:19 AMலேப்டாப் வாங்கும்போது கவனிக்க வேண்டியவை ...ganik70
1/14/2013Chennai Bus/Bus Route : சென்னையின் பஸ்ரூட் எளிதில் அறிந்துகொள்ளganik70
1/14/2013Train - டிரைன் செல்லும் பாதையை உடனுக்குடன்அறிந்துகொள்ளganik70
10/2/201210 Hot IT skills for 2013ganik70
5/3/20121 ரூபாயில் இந்தியாவிற்கு பேச – GOOGLE VOICEganik70
1/9/2010குழந்தைகளுக்கான இணைய தளங்கள்!ganik70
8/22/2009உங்கள் எல்லா மின்னஞ்சல் பயன்பாட்டையும் ஜீமைலுக்கு மாற்ற சுலபமான வழிganik70
8/5/2009செல்போனில் இ-மெயில் தகவலைப்பெற...ganik70
6/11/2009அறிமுகமாகிவிட்டது Google Squared - புதிய தேடுபொறிjasmin
5/25/2009Yahoo 'Web Beacons' Spy On And Track Yahoo Usersjasmin
5/14/2009'Smiley' face symbol 'privatised'jasmin
3/31/2009Wi-Fi தொழில்நுட்பம் ஏற்படுத்தியுள்ள அச்சுறுத்தல்கள்!Hajas
3/26/2009செல்போன் கணிதம்ganik70
3/25/2009Internet Browsing - without ComputersHajas
3/19/2009இணைய அரட்டை அடிக்க Digsby - (பலவும் ஒன்றில்)ganik70
3/16/2009ரிலையன்ஸ் Net Connect Broadband +ganik70
3/10/2009தகவல் தொழில்நுட்பத்துறையில் புதியபுரட்சி செய்யப்போகும் "3G" செல்போன் சேவை... !!!ganik70
3/8/2009பழுதடைந்த CD / DVD களை இயக்க, DVD படத்தை வெட்டியெடுக்கganik70
11/15/2008What Chandrayaan-1 aims to accomplishHajas
8/19/200812 early warning signs of IT failureHajas
6/15/2008Tamil Web Keyboardjasmin
4/2/2008Intel rolls out Atom chips at Shanghai tech forumHajas
4/1/2008What's keeping us from Mars? Space rays, say expertsHajas
3/5/2008Hack into a Windows PC - no password neededHajas
11/13/2007India hosts world's fourth fastest supercomputerHajas
10/24/2007Microsoft windows invades carsHajas
9/22/2007'Science mystified by the universe'Hajas
8/8/2007The car that won't start if you're drunkHajas
8/5/2007The time to refresh your memory is not far away!Hajas
2/10/2007How to Avoid Hoax Messages?jasmin
1/31/2007Three Back-to-Back Spacewalks Coming Up on StationHajas
12/6/2006Spam Doubles, Finding New Ways to Deliver ItselfHajas
12/6/2006General Guidelines for Internet Usersjasmin
6/27/2006Trim Your Windows Startuppeer
6/27/2006Clean Up What a Messy Uninstall Leaves Behindpeer
6/27/2006300GB storage disc (HVD)peer
6/26/2006Killer Photo Accessoriespeer
6/19/2006Hardware Tips: Free Tools Help Keep Your Hardware Hummingpeer
6/19/2006Internet Tips: Bolster Your Defenses Against Net Threatspeer
5/21/2006How Revolvers WorkMohamedris
4/24/2006How Google Grows...and Grows...and Growspeer
9/12/2005Mobile Phones Tips and tricks.Mohamedris
9/10/2005Useful Shortcut:jasmin
8/6/2005COMPUTER TIPSjasmin
8/6/2005How Computer Viruses work?jasmin
8/2/2005How To Build Better Passwordsjasmin
8/2/2005What are viruses, worms, and Trojans?jasmin
8/2/2005Scanning of Imagesjasmin
6/26/2005Useful Shortcuts for Windowsjasmin
5/21/2005Now, a browser that can talk to youjasmin
5/2/2005How Cell Phones WorkMohamedris
6/26/2004Tipu Sultan's contribution to Rocket Technologypeer
4/4/2004தமிழினக் காவலர் பில் கேட்ஸ் - Sujathapeer
4/4/2004யுனிகோடும் தமிழ் இணையமும் - உமர்peer
The view points and opinion solely those of the author or source. nellaiEruvadi.com is not responsible for the posted contents..