Pages

Thursday, November 3, 2011

Counter Measures for Hardware/Software Keylogger



Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They can be implemented via BIOS-levelfirmware, or alternatively, via a device plugged inline between a computer keyboard and a computer. They log all keyboard activity to their internal memory.

Description

Hardware keyloggers have an advantage over software keyloggers as they can begin logging from the moment a computer is turned on (and are therefore able to intercept passwords for the BIOS ordisk encryption software).
All hardware keylogger devices have to have the following:
  • microcontroller - this interprets the datastream between the keyboard and computer, processes it, and passes it to the non-volatile memory
  • A non-volatile memory device, such as flash memory - this stores the recorded data, retaining it even when power is lost
Generally, recorded data is retrieved by typing a special password into a computer text editor. The hardware keylogger plugged in between the keyboard and computer detects that the password has been typed and then presents the computer with "typed" data to produce a menu. Beyond text menu some keyloggers offer a high-speed download to speed up retrieval of stored data; this can be via USB mass-storage enumeration or with a USB or serial download adapter.
Typically the memory capacity of a hardware keylogger may range from a few kilobytes to several megabytes, with each keystroke recorded typically consuming a byte of memory.

[edit]Types of hardware keyloggers

Close-up of an inline PS/2keylogger.
A connected hardware-based keylogger.
  1. A Regular Hardware Keylogger is used for keystroke logging by means of a hardware circuit that is attached somewhere in between the computerkeyboard and the computer. It logs all keyboard activity to its internal memory which can be accessed by typing in a series of pre-defined characters. A hardware keylogger has an advantage over a software solution; because it is not dependent on the computer's operating system it will not interfere with any program running on the target machine and hence cannot be detected by any software. They are typically designed to have an innocuous appearance that blends in with the rest of the cabling or hardware, such as appearing to be an EMC Balun. They can also be installed inside a keyboard itself (as a circuit attachment or modification), or the keyboard could be manufactured with this "feature". They are designed to work with legacy PS/2 keyboards, or more recently, with USB keyboards. Some variants, known as wireless hardware keyloggers, have the ability to be controlled and monitored remotely by means of a wireless communication standard.[citation needed]
  2. Wireless Keylogger sniffers - Collect packets of data being transferred from a wireless keyboard and its receiver and then attempt to crack the encryption key being used to secure wireless communications between the two devices.
  3. Firmware - A computer's BIOS, which is typically responsible for handling keyboard events, can be reprogrammed so that it records keystrokes as it processes them.
  4. Keyboard overlays - a bogus keypad is placed over the real one so that any keys pressed are registered by both the eavesdropping device as well as the legitimate one that the customer is using.[1]

[edit]Countermeasures

Denial of physical access to sensitive computers, e.g. by locking the server room, is the most effective means of preventing hardware keylogger installation. Visual inspection is the easiest way of detecting hardware keyloggers. But there are also some techniques that can be used for most hardware keyloggers on the market, to detect them via software. In cases in which the computer case is hidden from view (e.g. at some public access kiosks where the case is in a locked box and only a monitor, keyboard, and mouse are exposed to view) and the user has no possibility to run software checks, a user might thwart a keylogger by typing part of a password, using the mouse to move to a text editor or other window, typing some garbage text, mousing back to the password window, typing the next part of the password, etc. so that the keylogger will record an unintelligible mix of garbage and password text[2] See also Keystroke logging countermeasures.
The main risk associated with keylogger use is that physical access is needed twice: initially to install the keylogger, and secondly to retrieve it. Thus, if the victim discovers the keylogger, they can then set up a sting operation to catch the person in the act of retrieving it. This could include camera surveillance or the review of access card swipe records to determine who gained physical access to the area during the time period that the keylogger was removed.
Source WIKIPEDIA

Sunday, October 9, 2011

Speed up XP in 2 Simple Steps



Want to speed up Windows XP on your computer? Simply turn off indexing and turn off hibernation and you would have speeded up your computer.

Turn off Indexing

Try this only if you rarely use Windows built in hard drive search, since it will work slowly after this fix.
Windows XP indexes files on your hard drive and stores them in memory to speed up the Windows Search. By turning off indexing, we free up memory and CPU horsepower to increase speed.

How to Change IP Address?



How to change my IP address? The Internet Protocol (IP) address of a computer on a network is the unique address (at that point in time) that a computer is identified by in a network. It is also the layer that sits atop the TCP/IP layer so that packets can be sent along to this address.
There are two types of IP addresses:-
  • Static IP: This IP address is assigned by the network solely for a computer and does not change every time the computer is connected to the network. This is to ensure same settings are applied in a Local Area Network (LAN), Wide Area Network (WAN) or even a Personal Area Network (PAN). These settings remain intact and thus ensure that the computer gets access to all the data it needs very fast. This type of IP address allocation is used by expensive broadband customers, or by express desire.
  • Dynamic IP: This IP address is allocated by the network router by using the Dynamic Host Configuration Protocol (DHCP). This protocol dynamically allocates an IP address to the computer when it connects to the network, from a pool of IP addresses. This kind of allocation is used in most broadband services as this reduces costs for the Internet Service Providers (ISP’s). Thus the IP address of the computer changes every time it connects to the host servers.

How to Clean a Dirty CD



Do you know how to clean a CD? Every time you keep your CD outside the pouch, there is a high possibility that the CD could get dirty, smudged or fingerprinted. And the problem with most of you is that you want to clean it but you don’t know how to clean it in such a dirty condition.
Scratched
Photo by Violets and Handshakes (under CC)

Cleaning Dirty CDs

For all those who want to clean a dirty CD with minimum effort in the cheapest way, follow the process with simple steps given below in order.

How to install Ubuntu Linux



Wondering how to install Ubuntu Linux? So, you finally decided to give up on the Windows or Mac OSX world and make a switch over to what could be considered the fastest growing operating system to date? Good. Ubuntucaptures all of what you could ever need in an operating system and packs it into the best installation package out at the moment. From media players, email and instant messaging clients, and a place to type up documents, Ubuntu has it all natively and it’s more than a piece of cake to grab an installation disc and get to work.

Install Ubuntu Linux Easily

Step 1: The first thing you need to do before actually installing the operating system is to get hold of the installation disc. The disc requires a DVD drive and a blank DVD-R to copy the disc to. If you’re unable to burn the disc to DVD, you must order one. But, the beauty of ordering one is that because the operating system is free, you don’t have to pay a dime for anything more than shipping. Go ahead and download or order an installation disc.