Expert Virus Removal Services and Technical advice.

We are Providing Computer users with Expert Virus Removal Services and Technical Advice.

Threats and their Removal.

Do you need a quick solution to a technical problem? With our live remote-assistance tool, a member of our support team can view your desktop and share control of your mouse and keyboard to get you on your way to a solution.

Spywares and their Removal.

Are you worried that your computer might be nfected with Spywares? Then this is were you can find Support.

Advices for Protecting the Computer.

Expert Advices for Protecting your computer from attacks from all threats

Different Anti Virus Software and Tools.

Familiarizing different Anti Virus Software and removal Tools.

November 1, 2010

Be careful whenever you're using a public computer!!

Please be careful whenever you're using a computer at a public place such as libraries, internet cafes, airports, and coffee shops, etc.

Check the back of the computer and see if the below device is there.
If so, do not use it!!!!

New storing device fits at the end of the keyboard cable connecting to the computer specialized to save all typed keys in it!!

It could be used commonly in internet cafes, exhibitions, hotels and airports. Please be careful when you access internet from these places to enter your bank accounts online or any other important websites.

After you enter the bank account details and leave the computer, it will be very easy to open your account again as all what you have typed has been saved in the Black Device.  
Therefore, you should check the computer for any suspicious device behind it before using the internet in public places accessing important websites.

These devices are generally known as "key loggers". The brand of keylogger shown in the message is a KeyShark Key Logger and is available for sale at many different computer outlets and websites around the world.


Product information about the device describes it as follows:


This is a device that can be connected to a keyboard to record all keystrokes. It has a changeable password, keyword search, enable/disable option, and stores over a years worth of data.


Keyshark plugs in between your keyboard and your computer. A microcontroller interprets the data, and stores information in the non-volatile memory (which retains the information even when there is a loss of power.) This means that the Key Shark device can be unplugged, and the information will not be lost.

The black Keyshark Key Logger shown in the photographs is in fact only one kind of hardware keylogger. The devices come in all shapes and sizes and are not always black. There are also USB and wifi keyloggers as well as PS/2 devices like the one shown here.


It should be noted that the devices themselves are not illegal and can be easily procured. Possible legitimate applications for keyloggers might be the monitoring of children's use of the Internet, permission based monitoring of staff activity or helping software developers learn how test users interact with new software products. Law enforcement agencies may also use the devices when gathering evidence or intelligence. That said, keyloggers can indeed be used for nefarious and illegal purposes. An unscrupulous Internet Cafe owner or staff member could certainly install the devices unbeknownst to customers.


All in all, however, a much more potent keylogging threat to users exists in the form of software keyloggers. Software keyloggers, which can perform the same function as hardware devices such as the Keyshark, are much cheaper and can potentially be installed on a great many more computers. Keylogger software in the form of trojans horses can be installed on thousands or even millions of computers via malware email campaigns that cost the criminal very little to implement. Therefore, it seems probable that serious criminals are considerably more likely to operate software keyloggers than use the more expensive and cumbersome hardware variety.

Facts about P2P file sharing: Know the risks

Peer-to-peer (P2P) file sharing is a convenient way to share public-domain music, audio, images, documents, and software programs over the Internet.

Using P2P, you can store files on your computer and go online to search for and share files with others using the same software; programs such as BitTorrent, Morpheus, Kazaa, LimeWire, and iMesh, among many others.

It's a good idea to understand and anticipate the risks of P2P file sharing before you download your first file.

Risk #1: Exposing your computer to unwanted software


Shared files can contain security risks such as viruses, spyware, and other unwanted software. A file that appears legitimate could be a virus in disguise. Unwary file sharers can download beneficial software that incorporates undisclosed spyware with it.

You can help prevent these dangers by following these steps:

Risk #2: Breaking copyright laws


Reputable P2P software is legal to use, but if you choose to do so, it's important to understand and differentiate between copyrighted and public domain material and to share responsibly.

When in doubt about a given file, it's best not to share or download it.

Tips for file sharing more safely
  • Monitor family P2P use and don't assume that using an Internet filter will protect your family from accessing or downloading unwanted or illegal material.
Because most Internet filters cannot block P2P file sharing, it's important to set guidelines and ensure that all family members are educated about illegal file sharing.
  • Treat all downloaded files with suspicion and use updated industry standard antivirus software to scan each new file before you click it. Set your antivirus software to automatically scan your hard disk on a regular basis, or do it manually yourself.
  • Delete any pirated material found on a family computer, digital audio player, CD-ROM disc, or other storage device and consider disabling the P2P software's downloading option or blocking outside access to the program by changing your computer's Internet firewall settings.
  • Learn all you can about your P2P software and be very careful about which files you make available to others. Most P2P shared files are typically stored in a single folder on your computer (often named "Shared Files").
  • Do not store copies of copyrighted files that you have legally purchased, such as songs from a CD or a licensed retail music site in your P2P file-sharing folder.
  • Back up important files on an external storage device or a CD-ROM disc before sharing or downloading files.

Five Important Tips for using a public computer

Public computers at libraries, Internet cafes, airports, and coffee shops are convenient, cheaper than buying your own laptop, and sometimes even free to use. But are they safe? Depends on how you use them.

Here are 5 tips on using public computers without compromising your personal or financial information.


1. Don't save your logon information


Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address.
Many programs (especially social networking Web sites, Web mail, and instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.



2. Don't leave the computer unattended with sensitive information on the screen
If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.


3. Erase your tracks
Internet Explorer 8 offers InPrivate browsing that leaves no trace of specific Web activity.Other browsers also support InPrivate browsing.
Internet Explorer also keeps a record of your passwords and every page you visit, even after you've closed them and logged out.
Disable the feature that stores passwords
Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords.
  • In Internet Explorer, click Tools, and then click Internet Options.
  • Click the Content tab, and then click Settings, next to AutoComplete.
  • Click to clear both check boxes having to do with passwords.
Delete your temporary Internet files and your history
When you finish your use of a public computer, you can help protect your private information by deleting your temporary Internet files.

4. Watch for over-the-shoulder snoops


When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.

5. Don't enter sensitive information into a public computer



These measures provide some protection against casual hackers who use a public computer after you have.
But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief.


Then it doesn't matter if you haven't saved your information or if you've erased your tracks. They still have access to this information.


If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer.

Related Posts Plugin for WordPress, Blogger...

Search This Blog

Followers

Categories

Twitter Delicious Facebook Digg Stumbleupon Favorites More