It is very hard to detect a keylogger’s activity. Hence, a Network Administrator should take the following steps as countermeasures against software keyloggers:

* Actively monitor the programs running on the server.
* Monitor the network whenever an application attempts to make a network connection.
* Use commercially available anti-keyloggers, such as PrivacyKeyboard.
* Update one’s antivirus regularly.
* Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Explore More

FBI Fears Chinese Hackers and/or Government Agents Have Back Door Into US Government & Military Computer Networks

ome months ago, my contacts in the defense industry had alerted me to a startling development that has escalated to the point of near-panick in nearly all corners of Government

Dyne’s Hackers List v1.10

0x01 – Definitions: Hacker vs Cracker The New Hacker’s Dictionary defines Hacker as: “A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as

Extensive SQL Injection Tutorial

( This is one of the most extensive and most usefull tutorials about this subject I’ve seen read this and you’ll be sure to get a beter understanding! ) TABLE