SlideShare a Scribd company logo
1 of 9
Ways to protect From
Keyloggers!
Stay Protected!
Introduction to Key logging
• When you use your system for personal
purposes like those of checking you bank
statement, logging into your social profile
etc. you simply type your credentials on
your keyboard.
Introduction to Key logging( Contd.)
• In order to reach the destination point, the
typed element, i.e your keystrokes travel a
path from the operating system to the
destination application.
• For example, to view your bank statement,
you type the username and password on the
keyboard which travel from your system to
the concerned bank server, where they get
verified and access is granted to you.
What’s Keylogger?
• Keylogger is a kind of surveillance system
which is used by the Cybercriminals to gain
access of user’s personal information.
• They do this by putting the Keylogger over
the traveling path of your data strokes and
destination points.
The working
• It starts from a data log file that the
keylogger creates from the keystrokes sent
by the user.
• This file then used by the Cybercriminals to
misuse user’s identity, access his bank
accounts to steal money, or perform other
malicious activities.
How to defend against keyloggers
Method 1:
Always use a firewall to protect your system
from such keylogging activities. If you haven’t
any, install it right now.
One more thing that you can do avoid such
data losses is choose the highest security
setting for your system.
Doing so, all programs will need a permission
from you before running and you can get a
hold on the program execution better.
How to defend against keyloggers(Contd)
Method 2:
Install an anti-virus and an anti-malware
program on your system. This will help you
scan your system for malware threats.
Do not forget to update the software regularly.
How to defend against keyloggers(Contd)
Method 3:
Download and install a program that encrypts
your keystrokes.
Encryption is a process in which the keystrokes
sent through your keyboard get encrypted in
the form of codes( a blend of numbers and
alphabets), before leaving your system
peripherals.
Doing so, your data will remain secure even
after it gets locked by the keyloggers.
Thank You!

More Related Content

What's hot

What's hot (20)

Account sharing detection
Account sharing detectionAccount sharing detection
Account sharing detection
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
OSCh19
OSCh19OSCh19
OSCh19
 
Ethical hacking anti virus
Ethical hacking   anti virusEthical hacking   anti virus
Ethical hacking anti virus
 
Virus and hacker (2)mmm
Virus and hacker (2)mmmVirus and hacker (2)mmm
Virus and hacker (2)mmm
 
Malware part 2
Malware part 2Malware part 2
Malware part 2
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web security
Web securityWeb security
Web security
 
Attack lecture #2 ppt
Attack lecture #2 pptAttack lecture #2 ppt
Attack lecture #2 ppt
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Client server network threat
Client server network threatClient server network threat
Client server network threat
 
Spyware
SpywareSpyware
Spyware
 
Website attack n defacement n its control measures
Website attack n defacement n its control measures Website attack n defacement n its control measures
Website attack n defacement n its control measures
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
UNDERSTANDING HACKING
UNDERSTANDING HACKINGUNDERSTANDING HACKING
UNDERSTANDING HACKING
 
ISDD Security Precautions
ISDD Security PrecautionsISDD Security Precautions
ISDD Security Precautions
 
Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020Cyber security slideshare_oct_2020
Cyber security slideshare_oct_2020
 
ISDD - Security Risks
ISDD - Security RisksISDD - Security Risks
ISDD - Security Risks
 
Live mobilehacking
Live mobilehackingLive mobilehacking
Live mobilehacking
 

Viewers also liked

Short Term Course in Low-Pressure Boiler Operations
Short Term Course in Low-Pressure Boiler OperationsShort Term Course in Low-Pressure Boiler Operations
Short Term Course in Low-Pressure Boiler OperationsMetro Technology Centers
 
Basic Statisitics - UvA
Basic Statisitics - UvABasic Statisitics - UvA
Basic Statisitics - UvABraz Júnior
 
Ejercicios temas 1 y 2 MATE
Ejercicios temas 1  y 2 MATEEjercicios temas 1  y 2 MATE
Ejercicios temas 1 y 2 MATE3sanagus
 
"I Heart Taxpayers" Sign
"I Heart Taxpayers" Sign"I Heart Taxpayers" Sign
"I Heart Taxpayers" SignTaxpayer_Love
 
FLV POWER POINT MAMENS SANCHEZ GALLEx
FLV POWER POINT MAMENS SANCHEZ GALLExFLV POWER POINT MAMENS SANCHEZ GALLEx
FLV POWER POINT MAMENS SANCHEZ GALLExmamensg
 
La crisis del imperio
La crisis del imperioLa crisis del imperio
La crisis del imperioClase6
 
Informações + inscrição NEE
Informações + inscrição NEEInformações + inscrição NEE
Informações + inscrição NEEanaenunes2
 
53066 educando de la mano con la tecnologia
53066   educando de la mano con la tecnologia53066   educando de la mano con la tecnologia
53066 educando de la mano con la tecnologiaangelmanuel22
 
My Industry verticals (SAP)
My Industry verticals (SAP)My Industry verticals (SAP)
My Industry verticals (SAP)Reddy Chemicala
 
Apache samza past, present and future
Apache samza  past, present and futureApache samza  past, present and future
Apache samza past, present and futureEd Yakabosky
 

Viewers also liked (20)

022
022022
022
 
Short Term Course in Low-Pressure Boiler Operations
Short Term Course in Low-Pressure Boiler OperationsShort Term Course in Low-Pressure Boiler Operations
Short Term Course in Low-Pressure Boiler Operations
 
Basic Statisitics - UvA
Basic Statisitics - UvABasic Statisitics - UvA
Basic Statisitics - UvA
 
Ejercicios temas 1 y 2 MATE
Ejercicios temas 1  y 2 MATEEjercicios temas 1  y 2 MATE
Ejercicios temas 1 y 2 MATE
 
Il mare in bottiglia
Il mare in bottigliaIl mare in bottiglia
Il mare in bottiglia
 
"I Heart Taxpayers" Sign
"I Heart Taxpayers" Sign"I Heart Taxpayers" Sign
"I Heart Taxpayers" Sign
 
FLV POWER POINT MAMENS SANCHEZ GALLEx
FLV POWER POINT MAMENS SANCHEZ GALLExFLV POWER POINT MAMENS SANCHEZ GALLEx
FLV POWER POINT MAMENS SANCHEZ GALLEx
 
Folder Viverdí
Folder ViverdíFolder Viverdí
Folder Viverdí
 
La crisis del imperio
La crisis del imperioLa crisis del imperio
La crisis del imperio
 
1
11
1
 
PM_Vitaminc.pdf
PM_Vitaminc.pdfPM_Vitaminc.pdf
PM_Vitaminc.pdf
 
03
0303
03
 
Informações + inscrição NEE
Informações + inscrição NEEInformações + inscrição NEE
Informações + inscrição NEE
 
Rubendario loaiza higuita 1
Rubendario loaiza higuita 1Rubendario loaiza higuita 1
Rubendario loaiza higuita 1
 
53066 educando de la mano con la tecnologia
53066   educando de la mano con la tecnologia53066   educando de la mano con la tecnologia
53066 educando de la mano con la tecnologia
 
George juvinall rev1
George juvinall rev1George juvinall rev1
George juvinall rev1
 
Daru desi
Daru desiDaru desi
Daru desi
 
12 02 2012 pagina_3
12 02 2012 pagina_312 02 2012 pagina_3
12 02 2012 pagina_3
 
My Industry verticals (SAP)
My Industry verticals (SAP)My Industry verticals (SAP)
My Industry verticals (SAP)
 
Apache samza past, present and future
Apache samza  past, present and futureApache samza  past, present and future
Apache samza past, present and future
 

Similar to Ways to protect From Keyloggers!

ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxdawitTerefe5
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?Bibek Sharma
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...GIRISHKUMARBC1
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3qacaybagirovv
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OSC.U
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryptionmonroel
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.Ankur Kumar
 
Network security
Network securityNetwork security
Network securityAli Kamil
 
토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guide토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guidePak Plants
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and crackingHarshil Barot
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber securityGeevarghese Titus
 

Similar to Ways to protect From Keyloggers! (20)

ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Communication security
Communication securityCommunication security
Communication security
 
Computer security
Computer securityComputer security
Computer security
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
 
Keyloger & spyware
Keyloger & spyware Keyloger & spyware
Keyloger & spyware
 
D-Cipher
D-CipherD-Cipher
D-Cipher
 
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
Cyber Security Module 3.pptx Cybersecurity is the practice of protecting syst...
 
operating system Security presentation vol 3
operating system Security presentation vol 3operating system Security presentation vol 3
operating system Security presentation vol 3
 
Security testing
Security testingSecurity testing
Security testing
 
OS_Ch19
OS_Ch19OS_Ch19
OS_Ch19
 
Ch19 OS
Ch19 OSCh19 OS
Ch19 OS
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Viruses, Biometrics, Encryption
Viruses, Biometrics, EncryptionViruses, Biometrics, Encryption
Viruses, Biometrics, Encryption
 
Computer , Internet and physical security.
Computer , Internet and physical security.Computer , Internet and physical security.
Computer , Internet and physical security.
 
Network security
Network securityNetwork security
Network security
 
토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guide토토어택: Understanding the Threat and complete guide
토토어택: Understanding the Threat and complete guide
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
hacking ,bluetooth
hacking ,bluetoothhacking ,bluetooth
hacking ,bluetooth
 
Introduction to cyber security
Introduction to cyber securityIntroduction to cyber security
Introduction to cyber security
 
Ransomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant MaliRansomware : A cyber crime without solution ? by Prashant Mali
Ransomware : A cyber crime without solution ? by Prashant Mali
 

More from Multisoft Virtual Academy

Google BigQuery Training Certification Course.docx
Google BigQuery Training Certification Course.docxGoogle BigQuery Training Certification Course.docx
Google BigQuery Training Certification Course.docxMultisoft Virtual Academy
 
ServiceNow Software Asset Management - PPT.docx
ServiceNow Software Asset Management - PPT.docxServiceNow Software Asset Management - PPT.docx
ServiceNow Software Asset Management - PPT.docxMultisoft Virtual Academy
 
introducing you with our newly launched courses – join today
introducing you with our newly launched courses – join todayintroducing you with our newly launched courses – join today
introducing you with our newly launched courses – join todayMultisoft Virtual Academy
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPTMultisoft Virtual Academy
 
Machine learning online courses | multisoft virtual academy
Machine learning online courses | multisoft virtual academyMachine learning online courses | multisoft virtual academy
Machine learning online courses | multisoft virtual academyMultisoft Virtual Academy
 
Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses
Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses
Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses Multisoft Virtual Academy
 

More from Multisoft Virtual Academy (20)

Ab initio Online Training & Certification
Ab initio Online Training & CertificationAb initio Online Training & Certification
Ab initio Online Training & Certification
 
Google BigQuery Training Certification Course.docx
Google BigQuery Training Certification Course.docxGoogle BigQuery Training Certification Course.docx
Google BigQuery Training Certification Course.docx
 
ServiceNow Software Asset Management - PPT.docx
ServiceNow Software Asset Management - PPT.docxServiceNow Software Asset Management - PPT.docx
ServiceNow Software Asset Management - PPT.docx
 
introducing you with our newly launched courses – join today
introducing you with our newly launched courses – join todayintroducing you with our newly launched courses – join today
introducing you with our newly launched courses – join today
 
Cloud Computing Courses
Cloud Computing CoursesCloud Computing Courses
Cloud Computing Courses
 
Staad Pro Online Training
Staad Pro Online TrainingStaad Pro Online Training
Staad Pro Online Training
 
informatica training
informatica traininginformatica training
informatica training
 
cloud computing tools
cloud computing toolscloud computing tools
cloud computing tools
 
Salesforce Online Training
Salesforce Online TrainingSalesforce Online Training
Salesforce Online Training
 
PPT on Machine Learning Introducation
PPT on Machine Learning IntroducationPPT on Machine Learning Introducation
PPT on Machine Learning Introducation
 
Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020 Simple Internet Of Things (IoT) PPT 2020
Simple Internet Of Things (IoT) PPT 2020
 
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPTInternet Of Things(IOT) | IOT Project |  IOT Products | IOT Examples | IOT PPT
Internet Of Things(IOT) | IOT Project | IOT Products | IOT Examples | IOT PPT
 
Machine learning online courses | multisoft virtual academy
Machine learning online courses | multisoft virtual academyMachine learning online courses | multisoft virtual academy
Machine learning online courses | multisoft virtual academy
 
Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses
Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses
Microsoft Courses | Microsoft Courses Online | Microsoft Training Courses
 
Salesforce Admin Training
Salesforce Admin TrainingSalesforce Admin Training
Salesforce Admin Training
 
MSP Training
MSP TrainingMSP Training
MSP Training
 
MATLAB Training Online
MATLAB Training OnlineMATLAB Training Online
MATLAB Training Online
 
SAP HANA Certified course
SAP HANA Certified courseSAP HANA Certified course
SAP HANA Certified course
 
Self Learning online training
Self Learning online trainingSelf Learning online training
Self Learning online training
 
Learn Staad. Pro Online
Learn Staad. Pro OnlineLearn Staad. Pro Online
Learn Staad. Pro Online
 

Recently uploaded

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the ClassroomPooky Knightsmith
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxUmeshTimilsina1
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxJisc
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 

Recently uploaded (20)

Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 

Ways to protect From Keyloggers!

  • 1. Ways to protect From Keyloggers! Stay Protected!
  • 2. Introduction to Key logging • When you use your system for personal purposes like those of checking you bank statement, logging into your social profile etc. you simply type your credentials on your keyboard.
  • 3. Introduction to Key logging( Contd.) • In order to reach the destination point, the typed element, i.e your keystrokes travel a path from the operating system to the destination application. • For example, to view your bank statement, you type the username and password on the keyboard which travel from your system to the concerned bank server, where they get verified and access is granted to you.
  • 4. What’s Keylogger? • Keylogger is a kind of surveillance system which is used by the Cybercriminals to gain access of user’s personal information. • They do this by putting the Keylogger over the traveling path of your data strokes and destination points.
  • 5. The working • It starts from a data log file that the keylogger creates from the keystrokes sent by the user. • This file then used by the Cybercriminals to misuse user’s identity, access his bank accounts to steal money, or perform other malicious activities.
  • 6. How to defend against keyloggers Method 1: Always use a firewall to protect your system from such keylogging activities. If you haven’t any, install it right now. One more thing that you can do avoid such data losses is choose the highest security setting for your system. Doing so, all programs will need a permission from you before running and you can get a hold on the program execution better.
  • 7. How to defend against keyloggers(Contd) Method 2: Install an anti-virus and an anti-malware program on your system. This will help you scan your system for malware threats. Do not forget to update the software regularly.
  • 8. How to defend against keyloggers(Contd) Method 3: Download and install a program that encrypts your keystrokes. Encryption is a process in which the keystrokes sent through your keyboard get encrypted in the form of codes( a blend of numbers and alphabets), before leaving your system peripherals. Doing so, your data will remain secure even after it gets locked by the keyloggers.