news

5 Effective Ways to Overcome the Key Logger Virus

If you don’t know what a Key Logger is, it’s one of the most important things you should be aware of if you want to learn a little about information security. We have previously shared a detailed explanation about Key Logger and how it monitors your computer activity (comprehensive topic). But I will give you a brief overview of what a Key Logger is. It is a tool used to record all the keystrokes you make on the computer keyboard and is used for many reasons, the most important and famous of which is related to hackers or intruders. So we will share with you 5 ways you can use to overcome Key Logger without recording what you type to protect your passwords and bank accounts.



1- Ensure no additional connections

One of the ways through which you can overcome Key Logger is to make sure there are no additional connections connected to the keyboard. This method is the most common in many public places where the goal is to record only the data being typed. However, an experienced person can obtain a copy of that data, so to protect yourself, you should ensure that there are no additional connections connected to the keyboard. If you find any, you should disconnect or replace the keyboard with another one.


2- Use OSK

This abbreviation stands for On Screen Keyboard, which is a virtual keyboard in the Windows system that allows you to type using the mouse without the need for a physical keyboard. To do this, open the Run window and type OSK to open the on-screen keyboard. Start using it to type passwords or banking information that you are afraid might be recorded by Key Logger because you are using the mouse to enter letters, not the physical keyboard.


3- Two-step verification

One of the most effective ways to truly overcome Key Logger is even if keystrokes of your keyboard are recorded and someone manages to obtain your passwords, they won’t be able to log into your accounts. This is because every time a verification code is sent to your phone number, and they can only log in if you input it. It is also good to know that there are many important websites that offer this feature to provide better protection.


4- Camouflage with rewriting

If you are not familiar with this method, it is one of the ways you can use to deceive someone spying on you through a keylogger by first typing a series of random numbers and letters that could be a password. After typing it, you highlight it with the mouse and then rewrite the correct password. The computer will either record both the correct and incorrect passwords, making it difficult to decipher, or it will only record the first (incorrect) password and not the second (correct) password because it will believe it has already been recorded.


5- Half wrong, half right

This method is one of the most deceptive ways you can use to get rid of Key Logger. You start by writing half of the password in the first attempt, then write a certain number of letters and numbers, and then complete the second half of the password. Next, you select the extra characters using the mouse, then delete those extra characters not with the Delete key but with the mouse, for example, by cutting those characters. Finally, you log in without the spy knowing your passwords.

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button
error: Content is protected !!