How to Block Keyloggers

Save

Keyloggers are software or hardware tools that hackers can use to record sensitive data such as your user IDs, passwords and credit card information. Although there are legitimate uses for keyloggers, such as a parent wanting to supervise her child's Internet surfing or an employer wanting to see what his employees are doing during the day, often they are used for illicit purposes. So if you are afraid that someone might be trying to steal your data, you can block keyloggers.

Things You'll Need

  • Keylogger scrambling software
  • Download and install KeyScrambler (see link in References below). If you are using either Firefox or Internet Explorer, you can use the free version of the software. You must also be running Windows 2000, 2003, XP, Vista or 7.

  • Make sure the software is working. Once you've installed the software, you will need to restart your computer. When you launch your Internet browser and try to log in to a website, you should see a small overlay window in the top left corner of your screen. Here you will see the KeyScrambler encrypting your key strokes as you type them. So if someone is trying to use a keylogger on you, he will merely get a bunch of gibberish when he checks the logs.

  • Upgrade your service. The free version of KeyScrambler works on Internet Explorer and Firefox only. If you are using a different browser, you will need to use the Professional or Premium versions. As of December 2009 they cost $29.99 and $44.99, respectively. In addition to protecting Internet browsers they also protect applications such as e-mail, chat and games.

Related Searches

References

  • Photo Credit Jupiterimages/Photos.com/Getty Images
Promoted By Zergnet

Comments

You May Also Like

  • How to Uninstall Aobo Keylogger

    Aobo keylogger is a program for Mac computers that records the activity of system users, enabling parents to monitor their children or...

  • How to Detect & Block a Keystroke Logger

    While keystroke loggers may have legitimate applications in some business settings, they are most often used by attackers to steal personal information...

Related Searches

Check It Out

Geek Vs Geek: Robot battles, hoverboard drag race, and more

M
Is DIY in your DNA? Become part of our maker community.
Submit Your Work!