It is very hard to detect a keylogger’s activity. Hence, a Network Administrator should take the following steps as countermeasures against software keyloggers:

* Actively monitor the programs running on the server.
* Monitor the network whenever an application attempts to make a network connection.
* Use commercially available anti-keyloggers, such as PrivacyKeyboard.
* Update one’s antivirus regularly.
* Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Explore More

Recommended Firewall Freebies

A couple of very good free firewall programs you might consider installing include * ZoneAlarm from http://www.zonelabs.com * SyGate from http://www.sygate.com TIP If you really like the idea of a

Mobile trace – How cell phone tracing works? Technology, and software’s

Is it possible to track a GSM/ CDMA cellular phone? Is there a software in market which tracking the location of the phone? Is it possible to track lost mobile?

critical SQL injection (vulnerability) on Myanmar Online Advertisement

PlanetCreator.Net’s Security Team member $@T0R! reported another critical SQL injection (vulnerability) on Myanmar Online Advertisement URL : http://www.myanmaradv.com/ SQL injection is a code injection technique that exploits a security vulnerability