Skip to main content

How to mislead keylogger?





https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

Keylogger is the program, what will record the push of the keyboard buttons and that would allow the hackers to get passwords and other private stuff. That program can use the Internet to send that data, or it can record it and store it to USB-stick, what is put in the back of the computer. The local storage is always visible for the user, and if somebody has left USB to the computer, that thing must be removed before use.


The local storage is suitable in cases, where the hacker has access to the room, where the computer, what is under observation locates. And when the hacker would stop the eavesdropping, must this person just remove the USB stick and keylogger from the computer. But what if the keylogger would send the data to the Internet. One of the best way to avoid that observation and minimize the damages. This means that the public computers would just be used for public purposes, and personal data like bank Saldo must be checked from own computer.


In this case of the security solution that workplaces computers are used only for work, and the things, what the user can show even in the evening news. The reason for spying on the workers might be that the bosses want to know, what the workers are talking about them, but sometimes the purpose of the eavesdropping is just showing the superiority for other people who work as their henchmen.  But the keylogger can be misleading very easily. One of the best ways is the naping couple of extra letters ahead of the password, or write password a couple of times wrong, and that would confess, that the user would not access to some databases, what are interesting for some hackers.


Extra letters and false passwords can give the signal for the hackers, that the user has the memory problems, and if the keylogger has been set by the employer. In this scenario, the security chief would call the worker to the office, and tell that there are many errors in the passwords. And after that, this boss tells that the worker should go home and find a new job, and then he would uncover the secret that every computer in this company have been observed.  And that would be very nice to know.

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....