Twitter Antics
Page 2 of 2 • Share
Page 2 of 2 • 1, 2
Re: Twitter Antics
____________________
PeterMac's FREE e-book
Gonçalo Amaral: The truth of the lie
CMOMM & MMRG Blog
MAGA MBGA
Re: Twitter Antics
Get'em, change your password again using the on screen key pad not your normal key board and make it 13+ characters long using numbers and symbols.
You may have a key stroke tracker on your computer.
You may have a key stroke tracker on your computer.
Guest- Guest
Re: Twitter Antics
On screen key pad? What's that?
____________________
PeterMac's FREE e-book
Gonçalo Amaral: The truth of the lie
CMOMM & MMRG Blog
MAGA MBGA
Re: Twitter Antics
Found it!
Not too fussed about twitter but I've used it to change the password for the forum.
Thanks for that!
Not too fussed about twitter but I've used it to change the password for the forum.
Thanks for that!
____________________
PeterMac's FREE e-book
Gonçalo Amaral: The truth of the lie
CMOMM & MMRG Blog
MAGA MBGA
Re: Twitter Antics
Brilliant tip Stella, thank you
____________________
PeterMac's FREE e-book
Gonçalo Amaral: The truth of the lie
CMOMM & MMRG Blog
MAGA MBGA
Re: Twitter Antics
You should still sort twitter out as well, to stop them impersonating you.
Guest- Guest
Re: Twitter Antics
Yes, I will if it gets reactivated again.
____________________
PeterMac's FREE e-book
Gonçalo Amaral: The truth of the lie
CMOMM & MMRG Blog
MAGA MBGA
Re: Twitter Antics
Another tip, if you ever have something private and confidential to write to anyone. Use another computer not connected to the internet to type it up on and use a memory stick to transfer it to your main computer, just copy and paste it into an email, then send. Again, key tracker no good for them. Ha, ha.
Frequently change your passwords, never sit on them for too long. I know it's a pain, but it's part of their game and tell 'em
Frequently change your passwords, never sit on them for too long. I know it's a pain, but it's part of their game and tell 'em
Guest- Guest
Re: Twitter Antics
Just googled about this info and it can still be hacked. He's good old Leo, often visit and ask questions there.
Will using an on screen keyboard stop keyboard loggers and hackers?
The short answer is very simple: no.
All the techie explanation here..................
http://ask-leo.com/will_using_an_on_screen_keyboard_stop_keyboard_loggers_and_hackers.html
Will using an on screen keyboard stop keyboard loggers and hackers?
The short answer is very simple: no.
All the techie explanation here..................
http://ask-leo.com/will_using_an_on_screen_keyboard_stop_keyboard_loggers_and_hackers.html
Guest- Guest
Re: Twitter Antics
From the site in link below...................
The on screen keyboard application is a "virtual" keyboard. It effectively has its own device driver, and to Windows "looks like" a real keyboard. As a result, the keystrokes it sends onto Windows can quite easily be captured by the same key logging software that's capturing keystrokes from the real keyboard, if that key logger has installed itself into the proper place.
But it gets worse. Much worse, actually.
Let's assume that the keystroke logger is not able to capture the keystrokes from the virtual on-screen keyboard.
A keystroke logger can capture a lot more than just keystrokes, so perhaps it'll capture something else instead.
You use the virtual keyboard by using your mouse to point and click at the image of a key on the keyboard. A keystroke logger could then capture on every mouse click:
•
the location of the mouse on the screen
•
a screen shot image of the screen, or just the area "around" the mouse pointer
What the key logger has done is captured a series of images showing exactly where you clicked and in what order. In other words, it's captured your virtual keystrokes.
Note that this approach to key logging also bypasses one of the more common so-called security techniques of randomizing the keyboard layout on the screen. You still have to be able to see where to click, and the logger simply logs what you see and where you click, regardless of how the keyboard is laid out.
How big a threat is this?
It depends on whom you ask. In my opinion "normal" keystroke loggers - those that record only keystrokes - are a fairly common threat, and are one part of the reason that anti-malware protection and general internet safety common sense in general is so important. So yes, they're out there.
The real question is how pervasive are these more sophisticated screen capturing keyloggers? It's hard to say, but we do know that malware creators have continued to escalate their attacks, both in technique and in scope. It wouldn't surprise me to see these types of malware increase in frequency.
And I, personally, wouldn't rely on a virtual keyboard of any sort as a security measure.
http://ask-leo.com/will_using_an_on_screen_keyboard_stop_keyboard_loggers_and_hackers.html
The on screen keyboard application is a "virtual" keyboard. It effectively has its own device driver, and to Windows "looks like" a real keyboard. As a result, the keystrokes it sends onto Windows can quite easily be captured by the same key logging software that's capturing keystrokes from the real keyboard, if that key logger has installed itself into the proper place.
But it gets worse. Much worse, actually.
Let's assume that the keystroke logger is not able to capture the keystrokes from the virtual on-screen keyboard.
A keystroke logger can capture a lot more than just keystrokes, so perhaps it'll capture something else instead.
You use the virtual keyboard by using your mouse to point and click at the image of a key on the keyboard. A keystroke logger could then capture on every mouse click:
•
the location of the mouse on the screen
•
a screen shot image of the screen, or just the area "around" the mouse pointer
What the key logger has done is captured a series of images showing exactly where you clicked and in what order. In other words, it's captured your virtual keystrokes.
Note that this approach to key logging also bypasses one of the more common so-called security techniques of randomizing the keyboard layout on the screen. You still have to be able to see where to click, and the logger simply logs what you see and where you click, regardless of how the keyboard is laid out.
How big a threat is this?
It depends on whom you ask. In my opinion "normal" keystroke loggers - those that record only keystrokes - are a fairly common threat, and are one part of the reason that anti-malware protection and general internet safety common sense in general is so important. So yes, they're out there.
The real question is how pervasive are these more sophisticated screen capturing keyloggers? It's hard to say, but we do know that malware creators have continued to escalate their attacks, both in technique and in scope. It wouldn't surprise me to see these types of malware increase in frequency.
And I, personally, wouldn't rely on a virtual keyboard of any sort as a security measure.
http://ask-leo.com/will_using_an_on_screen_keyboard_stop_keyboard_loggers_and_hackers.html
Guest- Guest
Re: Twitter Antics
Well that's interesting. But reading that he did seem to say it might stop most of them, but a few high tech individuals may be able to bypass that. So it's still worth trying, as I doubt we have the CIA trying to hack into here.
Guest- Guest
Re: Twitter Antics
Someone on that link at the bottom has found a way round it.
One method that DOES defeat keyloggers (correct me if I'm wrong) is moving the cursor mid-password by clicking it in a different location or even outside the password field.
For instance, if your password is "12534," first type "1234," click the mouse after the second character, and type in "5." The keylogger will record "12345" but the browser will send your correct password to the server. To further thwart the attacker, after typing "5" click the mouse anywhere outside the field and type "67"; then, click the mouse in the password field again and hit Enter. The keylogger will record "1234567," which is nowhere near the real "12534" password.
It should go without saying but, for this to work, you HAVE to use the mouse and not the arrow keys on the keyboard!
One method that DOES defeat keyloggers (correct me if I'm wrong) is moving the cursor mid-password by clicking it in a different location or even outside the password field.
For instance, if your password is "12534," first type "1234," click the mouse after the second character, and type in "5." The keylogger will record "12345" but the browser will send your correct password to the server. To further thwart the attacker, after typing "5" click the mouse anywhere outside the field and type "67"; then, click the mouse in the password field again and hit Enter. The keylogger will record "1234567," which is nowhere near the real "12534" password.
It should go without saying but, for this to work, you HAVE to use the mouse and not the arrow keys on the keyboard!
Guest- Guest
Re: Twitter Antics
Stella wrote:Someone on that link at the bottom has found a way round it.
One method that DOES defeat keyloggers (correct me if I'm wrong) is moving the cursor mid-password by clicking it in a different location or even outside the password field.
For instance, if your password is "12534," first type "1234," click the mouse after the second character, and type in "5." The keylogger will record "12345" but the browser will send your correct password to the server. To further thwart the attacker, after typing "5" click the mouse anywhere outside the field and type "67"; then, click the mouse in the password field again and hit Enter. The keylogger will record "1234567," which is nowhere near the real "12534" password.
It should go without saying but, for this to work, you HAVE to use the mouse and not the arrow keys on the keyboard!
But this is Leo's reply to that above question Stella...
This will not defeat keyloggers. Keyloggers often log much more than keystrokes, and include mouse movements, clicks and even screen shots.
05-Nov-2010
Guest- Guest
Re: Twitter Antics
Scrambling the password as above, seems to be quite popular elsewhere in resolving this issue.
http://www.intrepid.com.au/how-to-defeat-a-hardware-or-software-keylogger/
Leo is probably right Candyfloss you cannot simply stop everyone, i.e. the top level hackers in the world, but this will stop all the others.
Let's face it, if you have the CIA, MI6 or anyone else like that trying to get on your computer, you've had it !!!
http://www.intrepid.com.au/how-to-defeat-a-hardware-or-software-keylogger/
Leo is probably right Candyfloss you cannot simply stop everyone, i.e. the top level hackers in the world, but this will stop all the others.
Let's face it, if you have the CIA, MI6 or anyone else like that trying to get on your computer, you've had it !!!
Guest- Guest
Re: Twitter Antics
Moa wrote:Just found a twitter joke :
OJ Simpson, Michael Barrymore, Kate McCann, Gerry McCann, and Amanda Knox walk into a bar. No they didn't, and you can't prove they did.
scotclogs- Posts : 146
Activity : 155
Likes received : 2
Join date : 2011-01-09
Age : 70
Location : Netherlands
Page 2 of 2 • 1, 2
Similar topics
» McCann supporter Richard Branson's antics on Neckar island
» Listen (39 minutes) to 'Alan' of 'Alan's Antics' (on Radio Free UK) read out Sonia Poulton's rambling whinge about the 'trolls' who have opposed her documentary and the alleged reasons why her 'Untold Story of Madeleine McCann' remains untold [Feb 2016]
» Twitter (News and important information only please)
» From Twitter
» CADAVER DOG ALERTS EVIDENCE ALLOWED in the Casey Anthony trial
» Listen (39 minutes) to 'Alan' of 'Alan's Antics' (on Radio Free UK) read out Sonia Poulton's rambling whinge about the 'trolls' who have opposed her documentary and the alleged reasons why her 'Untold Story of Madeleine McCann' remains untold [Feb 2016]
» Twitter (News and important information only please)
» From Twitter
» CADAVER DOG ALERTS EVIDENCE ALLOWED in the Casey Anthony trial
Page 2 of 2
Permissions in this forum:
You cannot reply to topics in this forum