How to Defeat a Key Logger
- 1). Understand how keystroke loggers work. Keystroke logging offers the unscrupulous individual with wide-open access to an unsuspecting user's passwords, credit card numbers, and the full text of his or her online communications, ranging from emails to private messaging. Although a person's typing can be observed and recorded in many different ways, there are two different technological approaches commonly used.
- 2). The first option uses special hardware, inserted in the connection between the keyboard and the computer. These hardware-based key loggers record every keystroke, space, and character input on the compromised keyboard. Other versions of this device may be built into a compromised keyboard, offering no external sign that they are there.
- 3). The second form of key logger uses software rather than hardware and can be far more difficult to defeat. These programs, in addition to recording any input from a keyboard, will often record mouse movements, clicks, and take regular screenshots as well. These programs are best removed fully, rather than bypassed.
- 4). Try to remove the problem entirely. The simplest way to defeat a key logging device or piece of malware is simply to remove it. If an unknown device is plugged in between the keyboard and computer, take it out. If a keyboard is believed to have key logging hardware built in, swap it for a reliable one.
- 5). Software key loggers can also be removed once detected. Anti-virus and security software packages will search for such programs in their regular scans and often provide a one-step solution for removing the programs. Other times, checking the current processes the computer is running will allow a user to find, stop, and remove a malicious program.
- 1). Use an on-screen keyboard. This allows you to input passwords and credit card numbers using only the mouse, completely cutting out the keyboard.
- 2). Use a speech-to-text program, which uses a microphone to convert your spoken words into text. Programs such as Dragon NaturallySpeaking are affordable and can also be put to other uses, such as dictation.
- 3). Copy and paste sensitive information from an existing text file. By keeping all of your important passwords and account numbers in a pre-made file, you can input them into web forms and login screens without any of the information being typed. This method does, however, present a number of new risks that must be considered. It will not work against loggers that record on-screen images. It also puts all of your most sensitive data into one place, making that particular file easy pickings for anyone who can access it. It is especially important to clear the computer's clipboard after using any sort of password or information.
- 4). Add and replace characters. A very simple technique scrambles your sensitive information, making it undecipherable to anyone who reads it. By adding extra characters to password, then highlighting those extra characters with the mouse and replacing them with another character, you will have effectively inserted extra random characters into your password. For example, if you are entering the password "BOB," type "KFN," highlight those letters, then type "B." Repeat the steps for each letter. Then, instead of seeing "BOB," the data thief will instead see "KFNBKFNOKFNB," making the data unusable.