Pages

How To Protect Yourself Against Keylogger

What is a Keylogger?

It will not only record your user credentials (user name & password) when you login to social networks (facebook, twitter, etc...) or your bank, it will also record you chatting activity.

Most common victims of these are those who are using public computers, internet cafe, etc...


TYPES of Keyloggers

Software-based keyloggers


These are programs desinged to work on a the target computer's operating system. This is very dangerous because it can be spread on the internet in a trojan way. Like in forums, facebook, and other free downloading sites. Most of these keyloggers are crypted, which make it invisible to your antivirus software.

Hardware-based keyloggers

These type of keyloggers do not depend on a software being installed as they exist at a hardware level of your computer.
These are programs desinged to work on a the target computer's operating system. This is very dangerous because it can be spread on the internet in a trojan way. Like in forums, facebook, and other free downloading sites. 

Most of these keyloggers are crypted, which make it invisible to your antivirus software.

How to avoid being a victim of keylogging?

1. Before using the computer, make sure you check the back of the comptuer for keylogger hardware as shown in the picture. In any circumstances, there should be no extra connector connecting the keyboard to the tower (CPU).

2. Now you're sure that there is no hardware-based keylogger, lets get to the software side. The best thing to do would be to run a virus scan using malwarebytes or hitman pro, I personally recommend these tools as I find it very effective with fighting keyloggers.


To start Google Chrome, Opera, and most browsers in Private mode, press cntrl + shift + N. For Internet explorer press cntrol + shift + P. This will open a new Window, then you can do your browsing there.

Be safe online!


It is also known as Keyboard Capturing. Its function is to record the key stuck on a keyboard. Most of the time it is on a covert manner so the person using the keyboard is unaware that their actions are being monitored. 



Hardware-based keyloggers USB connector and  Keyboard port connector

Keyboard connector keylogger.
Hardware Type Keylogger
Another thing you should remember when in the internet cafe is use a private browser. Private mode on browsers will leave no traces on the cache, cookies, and browsing history. It also blocks some software-based keylogger from logging keystrokes.

How To Avoid Facebook Autotag

Have you been tag in a Facebook photo with instructions on it?

These are called auto tag spam. If you follow the instructions on the post, it will set your Facebook account to auto tag, auto like, and auto share. So if you encounter this spam, follow the instructions below to report it to Facebook.

Nothing will happen if you don't do something... Follow this very simple instruction on how to report a post as spam in Facebook.

1. Click Options and then select Report.

Go to options and select report.

 2. Now select "It's spam".

It's a spam


 3. Select "It's a spammy photo".

Report this types of post, and avoid compromising your account by following these tricks...Be safe online!