Which of the following is a method of capturing and recording computer users’ keystrokes including
sensitive passwords?
A.
Using hardware keyloggers
B.
Using Alchemy Remote Executor
C.
Using SocketShield
D.
Using Anti-virus software
Explanation:
Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer
users’ keystrokes, including sensitive passwords. They can be implemented via BIOS-level firmware,
or alternatively, via a device plugged inline between a computer keyboard and
a computer. They log all keyboard activities to their internal memory.
including computer viruses, worms, and
trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of
malware.
Anti-Virus software is a class of program that searches your hard drive, floppy drive, and pen drive
for any known or potential viruses. Themarket for this kind of program has expanded because of Internet growth and the increasing use of
the Internet by businesses concerned
about protecting their computer assets.
Popular Anti-Virus packages are as follows:
Bit Defender Anti-Virus
McAfee Virus Scan
Kaspersky Anti-Virus
F-Secure Anti-Virus
Symantec Norton Anti-Virus
Panda Titanium Anti-Virus
Avira Anti-Virus
Avast Anti-Virus
Trend Micro Anti-Virus
Grisoft AVG Anti-Virus
ESET Nod32 Anti-Virus
Webroot Anti-Virus
Quick Heal Anti-Virus
eTrust EZ Anti-Virus
ZoneAlarm Anti-Virus
Administrators to execute programs on remote network computers without leaving their workplace.
From the hacker’s point of view, it can be useful for installing keyloggers, spyware, Trojans, Windows
rootkits and such. One necessary condition for using the Alchemy Remote Executor is that the
user/attacker must have the administrative passwords of the remote computers on which the
malware is to be installed.
malware, viruses, spyware, and various types of keyloggers. SocketShield provides protection at the
following two levels:
1.Blocking: In this level, SocketShield uses a list of IP addresses that are known as purveyor of
exploits. All http requests for any page in these domains are simply blocked.
2.Shielding: In this level, SocketShield blocks all the current and past IP addresses that are the cause
of unauthorized access.
a
interesting about socket shield didn’t know that