It is very hard to detect a keylogger’s activity. Hence, a Network Administrator should take the following steps as countermeasures against software keyloggers:

* Actively monitor the programs running on the server.
* Monitor the network whenever an application attempts to make a network connection.
* Use commercially available anti-keyloggers, such as PrivacyKeyboard.
* Update one’s antivirus regularly.
* Use on-screen keyboards and speech-to-text conversion software which can also be useful against keyloggers, as there are no typing or mouse movements involved.

Explore More

Social Engineering is no science, it is pure trickery!

The term “Social Engineering” sounds like a serious academic subject on reforming a wayward society! Alas, far from the truth, it is pure and simple trickery, a con job. The

Zlob hacker writes love letter to Microsoft

Here’s a new way to get Microsoft to pay attention to you: slip a brief message into the malicious Trojan horse program you just wrote. That’s what an unnamed Russian

IP spoofing

IP spoofing is about the most advanced attack that can be executed on a computer system. IP spoofing, if done correctly, is one of the smoothest and hardest attacks on