" - This is simply not correct !!! You would have to use a constantly changing virtual keyboard (like the one on cryptoheavenDOTcom email system).įor more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: Show Details Necessary You can also use virtual keyboards in most of these programs which allow you to type without using the keyboard which bypasses keyloggers. Someone proposed to you a solution on this page by saying: ". ![]() You may find that it takes effort and time as the saying goes: "Those who survive the best in war are the paranoid". And extend your security in other directions. Now the next step is to scan for rootkits and spyware. You may want to check out which has a product out called Universal that works on iphones, macs, etc and does something really cool - it makes a secure tunnel for ALL your ports. If a program requires an inbound port or another outbound port you will get a pop-up prompt. Next BLOCK all other ports - especially high TCP outbound connections. The first step though should be to set your firewall (F-Secure is the best, the second best is Trend Micro Internet Security) to allow OUTBOUND port 80, 443, 21 (if you use passive FTP) and 53 for your DNS. ![]() As with anything to do with IT security it is a combination of things that work. There is no ONE WAY to protect against such threats.
0 Comments
Leave a Reply. |