How to be aware of keylogger dangers

Keylogger  is recording devices or activities conducted on the computer.Keylogger works secretly record every key you press on the keyboard. When we press az, 0-9, or a combination of keyboard like Shift +2, etc will be recorded by a keylogger. keylogger itself is divided into two types, Keylogger software and hardware,  keylogger hardware  is usually a device that is placed between the slots on the computer keyboard and the keyboard, while a program or a keylogger software applications installed on your computer that will be fitted Keylogger. Example of Keylogger software is Family Keylogger, or if you are creative you can make your own with VB6.0 or Delphi. Keylogger widely used in the hacker world, especially in the user name, password theft because most naive user (read: ordinary user) do not realize that the computer he used was fitted Keylogger. So that when the naive user it is opening an e-mail, chat MIRC, YM, open a blog, go FS, FB, and even e-banking transfers all of which use a user name-password turned out all the activities that have been recorded by a keylogger. SO after a naive user to go before the harvest this Keylogger installer user name-password that has been recorded

  • Sometimes the process is undetectable keylogger so vain you open Task Manager or use another tool Kill process but it never hurts to keep a watch out especially keylogger made with VB6.0 or Delphi.We could hijack the process by just download the program at: http://www.emsisoft.com/en/software/download/




We can use another trick by pressing Ctrl + Alt + Shift + F or the other keyboard combination showing the keylogger is installed. 

  • Refer to Start-Control Panel-Add and remove programs see if there any suspicious programs just simply uninstall them.

  • Using anti-keylogger software

How to Prevent hacking file sharing

Are your computers connected to network, or internet? you should be aware. You should notice a few tips that your data is not hacked by people who are not responsible and can be harmful. Do the tricks of the hacking prevent the following files:



  1. Turn off file sharing on WIN 9x on the machine. For system administrators to protect a large number of systems, can use the system policy editor (poledit.exe).The usefulness of this utility is to disable file and sharing facilities to all systems.
    This utility can be found on the cd in rektori WIN9X \ tools \ reskit \ netadmin \ if youneed to enable file sharing should use a complex password. In Win 9x onlymengijikan 8 pieces of characters, you should use a password that is difficult to predict.
  2. Non-automatic Enable parameter sharing via "AutoShare" in the registry."HKEY_LOCAL_MACHINE \ System \ CurrentControlSet \ Services \lanmanserver \ Parameters", and "AutoShareServer" on WinNT Server or"AutoShareWks" on WinNT Workstation. Contents of this DWORD, the value '1 'forenabled (default), or the value '0' for disabled.



3. When we open the My Computer menu in Windows XP, it will display a folder called Shared Documents  that are at the bottom of the list of drives. Microsoftmenu serves to hold the entire file and folder on the share to the network.
1. Run the Registry Editor Start-Run then type regedit. 2. Go to the subkeyMyComputer \ HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \CurrentVersion \ Explorer \ MyComputer \ NameSpace \ DelegateFolders. 3.Under the key DelegateFolders again there is a subkey named{59031a47-3f72-44a7-89c5-5595fe6b30ee}. Erase this subkey. Other computer users on the network will not see a default folder that had been shared byWindows.
4. Be sure to disable the Shared folder
If you find a file folder with a picture of the hand underneath the folder is the folderyou are sharing, if you want to prevent your data tershare then disable the sharedfolder by folder and right click-Properties-Sharing contereng uncheck the folderand click share this Or ok


Or by removing the parameter shares HKEY_LOCAL_MACHINE \ System \CurrentControlSet \ Services \ lanmanserver \ Because really when we share thefolder will change the registry. Remember there is no way 100% safe from the threat of hacking.

source :anharku.freevar



Simple ways to make Windows XP secure



What have you done to keep the Windows XP operating system safe from virus attacks? Installing antivirus? Whether or update Antivirus? True, these methods can be used to maintain the stability of our Windows operating system. However,carelessness can result  our computer security fragile, so weak in restraining the virus attack. This can result in damage to total operating system,which in turn improved the "Re-install the Operating System".
Very dull indeed, if the only way is to reinstall. Besides taking a long time, re-installprocess is also very boring. Why is that? Because we must re-install any necessary software. Both the software utility, Design, Multimedia, Document, and so forth.Well on this occasion will be explained a few simple steps are commonplace andare used in part to protect people in the OS. These methods may not uncommon for people who do not know. But what harm in trying, and so may help your computer defenses. As these methods are as follows.

  1. Turn off 'Autorun and Autoplay ". function
    How to turn off autorun and autoplay which I know can be done by using REGEDIT to autorun. And use gpedit to Autoplay. The second function is the same option but aktifasinya different ways.
    a. Through regedit.
         Open regedit by: Click Start> Run> enter "regedit" in the box> click ok.
         Follow the following string:

    HKEY_CURRENT_USER / Software / Microsoft / Windows / CurrentVersion / Policies / Explorer

    Double-click NoDriveTypeAutoRun and insert number 95 in Value Data.
    b. Through gpedit.
         Open gpedit by: Click Start> Run> enter "gpedit.msc" in the box> click ok.
          Follow the following string:
          Computer Configuration> Administrative Templates> System
          Double click and click Turn Off Autoplay enabled.
  2. Turn disbled Copy Paste via USB.
    Enable USB copy and paste functions if needed. This configuration can be done through regedit by using the following string.
    a. Click Start> Run> enter "regedit"> click ok.

    Click HKEY_LOCALMACHINE> SYSTEM> CurrentControlSet> Control

    b. Right-click on Control select New> Key, name it "StorageDevicePolicies".
    c. Right-click on StorageDevicePolicies, select New> DWORD Value named        "WriteProtect".
    d. Double click on WriteProtect, and change the value data to 1.
    e. Then Restart Computer / Laptop you.
         If successful, each time copying and pasting files, it will display the comment: Error  Copying File or Folder.
    If you want to restore to its original state, change the value data to 0.
  3. Antivirus updates.
    Update antivirus database update is intended for new viruses that have not been identified by antivirus software that we use. So that once updated, the antivirus can recognize the virus. Antivirus updates can be done by downloading the update file through the site we use antivirus manufacturers. Can also be done with an automatic update when the computer is connected to the internet.
  4. Scan Flash Disk.
    Scan any flash disk that is connected to the computer. Open the flash disk files after the scan is complete and cleared or viruses that fester in the flash disk has been erased or repaired.
  5. Identify Application Files that are considered weird
    The act was done in order to file our application does not run. Because the virus spread through the files of this type. Infection can occur after the files are executed. This can occur if your antivirus does not recognize the virus with a specific type. It could be because it has not to update antivirus. Then see this point.
  6. Avoid the habit of storing files on the drive where the Operating System install a. Usually the drive used is C: \. Then save the file and important data out of this drive, like D: \ or E: \ if it exists. This is done to avoid the worst if the computer needs to be installed Birthday. So it's no trouble in backing up data contained in the Drive where the OS (operating system) entrenched.
  7. Take Backup the operating system using similar applications Ghost. This helps you avoid re-install the Operating System. Ghost the same as the actual use of the computer re-install, but is faster and simpler because it allows you to backup applications that install a, so it does not need to be installed again. Backup is done after re-install and the installation of some applications that you consider important, such as Antivirus, Ms Word DSG
  8. Create a System Restore on your computer.
    This action is much simpler in backup Operating System. Restore Point is used to restore Windows back to form when we make the last Restore point. The trick is:
    a. After Re-install the operating system, make a restore point. By the way: Click Start> All Programs> Accessories> System Tools> System Restore
    b. Click Create a Restore Point, and click Next.
    c. Create a restore point name. And click Create.
    This indicates you create a Restore point and any time you can restore the state of your Operating System Restore Point to shape when it is made. Remember!This only applies to the system. No effect in the data storage process.

    source : isaninside.