SlideShare a Scribd company logo
3.
keylogger software records all the keystrokes pressed by us.This is dangerous when we apply
paswords.our passwords will be leaked to the people who developed these virus,for thier
pursonal benifits.To combat with this problem,there is a feature called as virtual keyboard in
most of the places in latest softwares,where we want to authenticate the data.As we already know
that keylogger cannot capture mouse events,we can use virtual keyword which is a replica of
keyboard in screen.we can click on the alphabets or numbers or any other keys in this replica
using mouse.This effect is same as pressing keys from the keyboard.This way we can enter our
data safely,when our computer or browser is affected by keylogger software.
4.yes,our computer/system is prone to threat by the popus.=.the software,which we downoad
may contain virus.It itself may be a virus.this is one of the way of transmitting viruses through a
web from system to system.sometimes these popup's tell us to click on some link,these links
sometimes leads virus infection computer,sometimes corrupt operating system,or deduce system
performance.
Solution
3.
keylogger software records all the keystrokes pressed by us.This is dangerous when we apply
paswords.our passwords will be leaked to the people who developed these virus,for thier
pursonal benifits.To combat with this problem,there is a feature called as virtual keyboard in
most of the places in latest softwares,where we want to authenticate the data.As we already know
that keylogger cannot capture mouse events,we can use virtual keyword which is a replica of
keyboard in screen.we can click on the alphabets or numbers or any other keys in this replica
using mouse.This effect is same as pressing keys from the keyboard.This way we can enter our
data safely,when our computer or browser is affected by keylogger software.
4.yes,our computer/system is prone to threat by the popus.=.the software,which we downoad
may contain virus.It itself may be a virus.this is one of the way of transmitting viruses through a
web from system to system.sometimes these popup's tell us to click on some link,these links
sometimes leads virus infection computer,sometimes corrupt operating system,or deduce system
performance.

More Related Content

Similar to 3.keylogger software records all the keystrokes pressed by us.This.pdf

COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
Sowjanya Sampathkumar
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
Buffalo Seminary
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
Muhammad Ramzan
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
Vikas Patel
 
Security Software
Security SoftwareSecurity Software
Security Software
bennybigbang
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
Debraj Chatterjee
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
missstevenson01
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Computervirus
Computervirus Computervirus
Computervirus
Dushyant Shekhawat
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
thatfunguygeek
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
WritingHubUK
 
Presentation2
Presentation2Presentation2
Presentation2
Jeslynn
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Computer Security
Computer SecurityComputer Security
Computer Security
secrettub
 
Computer virus
Computer virusComputer virus
Computer virus
Dark Side
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
Manoj Dongare
 
IT viruses
 IT viruses IT viruses
IT viruses
Hekmat Asefi
 
Virus
VirusVirus

Similar to 3.keylogger software records all the keystrokes pressed by us.This.pdf (20)

COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)COMPUTERS ( types of viruses)
COMPUTERS ( types of viruses)
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Viruses and Spyware
Viruses and SpywareViruses and Spyware
Viruses and Spyware
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Security Software
Security SoftwareSecurity Software
Security Software
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Computervirus
Computervirus Computervirus
Computervirus
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Presentation2
Presentation2Presentation2
Presentation2
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Compter virus and its solution
Compter virus and its solutionCompter virus and its solution
Compter virus and its solution
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Virus
VirusVirus
Virus
 

More from apsaracollections

5] Special adaptation of whales includes 1) flexible rib cage which .pdf
5] Special adaptation of whales includes 1) flexible rib cage which .pdf5] Special adaptation of whales includes 1) flexible rib cage which .pdf
5] Special adaptation of whales includes 1) flexible rib cage which .pdf
apsaracollections
 
1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf
1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf
1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf
apsaracollections
 
1. Orthogonality= Orthogonality mean change in something does not.pdf
1. Orthogonality= Orthogonality mean change in something does not.pdf1. Orthogonality= Orthogonality mean change in something does not.pdf
1. Orthogonality= Orthogonality mean change in something does not.pdf
apsaracollections
 
1) consolidated statment of incomeStatment of cash flowSum of pr.pdf
1) consolidated statment of incomeStatment of cash flowSum of pr.pdf1) consolidated statment of incomeStatment of cash flowSum of pr.pdf
1) consolidated statment of incomeStatment of cash flowSum of pr.pdf
apsaracollections
 
1 ansProcess of transforming normalized relations into denormaliz.pdf
1 ansProcess of transforming normalized relations into denormaliz.pdf1 ansProcess of transforming normalized relations into denormaliz.pdf
1 ansProcess of transforming normalized relations into denormaliz.pdf
apsaracollections
 
(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf
(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf
(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf
apsaracollections
 
seedless vascular plants=gymnosperms seed plants=angiosperms Flo.pdf
    seedless vascular plants=gymnosperms seed plants=angiosperms   Flo.pdf    seedless vascular plants=gymnosperms seed plants=angiosperms   Flo.pdf
seedless vascular plants=gymnosperms seed plants=angiosperms Flo.pdf
apsaracollections
 
See you have to obtain moles of N2O5 to calculate.pdf
                     See you have to obtain moles of N2O5 to calculate.pdf                     See you have to obtain moles of N2O5 to calculate.pdf
See you have to obtain moles of N2O5 to calculate.pdf
apsaracollections
 
Geometric isomers are two or more coordination co.pdf
                     Geometric isomers are two or more coordination co.pdf                     Geometric isomers are two or more coordination co.pdf
Geometric isomers are two or more coordination co.pdf
apsaracollections
 
lead has a 2+ charge in lead(II) nitrate, and nit.pdf
                     lead has a 2+ charge in lead(II) nitrate, and nit.pdf                     lead has a 2+ charge in lead(II) nitrate, and nit.pdf
lead has a 2+ charge in lead(II) nitrate, and nit.pdf
apsaracollections
 
a. The Pauli exclusion principle is the quantum m.pdf
                     a. The Pauli exclusion principle is the quantum m.pdf                     a. The Pauli exclusion principle is the quantum m.pdf
a. The Pauli exclusion principle is the quantum m.pdf
apsaracollections
 

More from apsaracollections (11)

5] Special adaptation of whales includes 1) flexible rib cage which .pdf
5] Special adaptation of whales includes 1) flexible rib cage which .pdf5] Special adaptation of whales includes 1) flexible rib cage which .pdf
5] Special adaptation of whales includes 1) flexible rib cage which .pdf
 
1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf
1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf
1c. Since DNA Polymerase works in 3-5direction thus one strand s.pdf
 
1. Orthogonality= Orthogonality mean change in something does not.pdf
1. Orthogonality= Orthogonality mean change in something does not.pdf1. Orthogonality= Orthogonality mean change in something does not.pdf
1. Orthogonality= Orthogonality mean change in something does not.pdf
 
1) consolidated statment of incomeStatment of cash flowSum of pr.pdf
1) consolidated statment of incomeStatment of cash flowSum of pr.pdf1) consolidated statment of incomeStatment of cash flowSum of pr.pdf
1) consolidated statment of incomeStatment of cash flowSum of pr.pdf
 
1 ansProcess of transforming normalized relations into denormaliz.pdf
1 ansProcess of transforming normalized relations into denormaliz.pdf1 ansProcess of transforming normalized relations into denormaliz.pdf
1 ansProcess of transforming normalized relations into denormaliz.pdf
 
(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf
(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf
(TCO F) In the U.S., laws are enforced by police agencies and the co.pdf
 
seedless vascular plants=gymnosperms seed plants=angiosperms Flo.pdf
    seedless vascular plants=gymnosperms seed plants=angiosperms   Flo.pdf    seedless vascular plants=gymnosperms seed plants=angiosperms   Flo.pdf
seedless vascular plants=gymnosperms seed plants=angiosperms Flo.pdf
 
See you have to obtain moles of N2O5 to calculate.pdf
                     See you have to obtain moles of N2O5 to calculate.pdf                     See you have to obtain moles of N2O5 to calculate.pdf
See you have to obtain moles of N2O5 to calculate.pdf
 
Geometric isomers are two or more coordination co.pdf
                     Geometric isomers are two or more coordination co.pdf                     Geometric isomers are two or more coordination co.pdf
Geometric isomers are two or more coordination co.pdf
 
lead has a 2+ charge in lead(II) nitrate, and nit.pdf
                     lead has a 2+ charge in lead(II) nitrate, and nit.pdf                     lead has a 2+ charge in lead(II) nitrate, and nit.pdf
lead has a 2+ charge in lead(II) nitrate, and nit.pdf
 
a. The Pauli exclusion principle is the quantum m.pdf
                     a. The Pauli exclusion principle is the quantum m.pdf                     a. The Pauli exclusion principle is the quantum m.pdf
a. The Pauli exclusion principle is the quantum m.pdf
 

Recently uploaded

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
Jyoti Chand
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
สมใจ จันสุกสี
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
imrankhan141184
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
paigestewart1632
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 

Recently uploaded (20)

South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Wound healing PPT
Wound healing PPTWound healing PPT
Wound healing PPT
 
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
คำศัพท์ คำพื้นฐานการอ่าน ภาษาอังกฤษ ระดับชั้น ม.1
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
Traditional Musical Instruments of Arunachal Pradesh and Uttar Pradesh - RAYH...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Cognitive Development Adolescence Psychology
Cognitive Development Adolescence PsychologyCognitive Development Adolescence Psychology
Cognitive Development Adolescence Psychology
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 

3.keylogger software records all the keystrokes pressed by us.This.pdf

  • 1. 3. keylogger software records all the keystrokes pressed by us.This is dangerous when we apply paswords.our passwords will be leaked to the people who developed these virus,for thier pursonal benifits.To combat with this problem,there is a feature called as virtual keyboard in most of the places in latest softwares,where we want to authenticate the data.As we already know that keylogger cannot capture mouse events,we can use virtual keyword which is a replica of keyboard in screen.we can click on the alphabets or numbers or any other keys in this replica using mouse.This effect is same as pressing keys from the keyboard.This way we can enter our data safely,when our computer or browser is affected by keylogger software. 4.yes,our computer/system is prone to threat by the popus.=.the software,which we downoad may contain virus.It itself may be a virus.this is one of the way of transmitting viruses through a web from system to system.sometimes these popup's tell us to click on some link,these links sometimes leads virus infection computer,sometimes corrupt operating system,or deduce system performance. Solution 3. keylogger software records all the keystrokes pressed by us.This is dangerous when we apply paswords.our passwords will be leaked to the people who developed these virus,for thier pursonal benifits.To combat with this problem,there is a feature called as virtual keyboard in most of the places in latest softwares,where we want to authenticate the data.As we already know that keylogger cannot capture mouse events,we can use virtual keyword which is a replica of keyboard in screen.we can click on the alphabets or numbers or any other keys in this replica using mouse.This effect is same as pressing keys from the keyboard.This way we can enter our data safely,when our computer or browser is affected by keylogger software. 4.yes,our computer/system is prone to threat by the popus.=.the software,which we downoad may contain virus.It itself may be a virus.this is one of the way of transmitting viruses through a web from system to system.sometimes these popup's tell us to click on some link,these links sometimes leads virus infection computer,sometimes corrupt operating system,or deduce system performance.