Solved

key logger

Posted on 2014-10-28
5
165 Views
Last Modified: 2014-10-28
I just had an idea, does it make sense that you could confuse key loggers by when you are going to enter your password, enter the wrong password, then back space and enter the correct one. My theroy is that the key logger is just going to show all the key strokes, so it would be harder to know which of the two passwords are correct. Or is it more likely that whoever is using the key logger would simply use both the incorrect then the correct password.
Also, encryption wouldn't work would it? because encryption is only when sending a password, correct? For instance, could you encrypt keystrokes?
Just wondering.
0
Comment
Question by:JeffBeall
5 Comments
 

Accepted Solution

by:
Todor Gevrekov earned 250 total points
Comment Utility
I think that a keylogger will show the password that was written and then was pressed enter or was accepted. And you can encrypt keystrokes and there are a few softwares that can do this, one of them is KeyScrambler Personal. You can download it here
http://download.cnet.com/KeyScrambler-Personal/3000-2144_4-10571274.html
0
 
LVL 19

Assisted Solution

by:Miguel Angel Perez Muñoz
Miguel Angel Perez Muñoz earned 250 total points
Comment Utility
Thats depends keylogger. I have one running on vbs catch all key pressed, this includes delete and another special keys.
Maybe more secure could be copy on clipboard your password and paste where it required, but some keyloggers catch clipboard too.
INMO, there is no 100% secure way, you are really worried about security, can enable two step authentication or maybe using any kind of certificate.
0
 
LVL 53

Expert Comment

by:McKnife
Comment Utility
You should not rely on keyloggers acting foolish, no. They will get you one way or the other. No, you cannot "encrypt" keystrokes.
There are some on screen keyboards that claim to be keylogger-proof, but I would not be totally content hat they really are. Best would be to start an extra system used only for those transactions that are security sensitive and not for surfing the web or installing all kinds of software.
0
 
LVL 1

Author Closing Comment

by:JeffBeall
Comment Utility
thank you for your thoughts.
0
 
LVL 53

Expert Comment

by:McKnife
Comment Utility
I wonder how the key scrambler mentioned manages to get the keys "first". Why wouldn't a keylogger be able to say "first let me record the typing, then I'll pass it on to keyscrambler"? Both work with filter drivers, I suppose. How will the hierarchy be determined?
Todor, do you know that?
0

Featured Post

Free Gift Card with Acronis Backup Purchase!

Backup any data in any location: local and remote systems, physical and virtual servers, private and public clouds, Macs and PCs, tablets and mobile devices, & more! For limited time only, buy any Acronis backup products and get a FREE Amazon/Best Buy gift card worth up to $200!

Join & Write a Comment

This story has been written with permission from the scammed victim, a valued client of mine – identity protected by request.
It’s a strangely common occurrence that when you send someone their login details for a system, they can’t get in. This article will help you understand why it happens, and what you can do about it.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now