The Internet should add convenience, not headaches. From step-by-step instructions to helpful tips, we'll help you install your equipment, troubleshoot problems, and get the most out of your online experience – minus the migraine.
Encrypting Your Key Strokes
Last Updated: Thu, 30 Aug 2012 > Related Articles
Learn about key logging and how to protect yourself from hacking.
Key stroke logging, also referred to as key logging, is when someone logs the strokes of a keyboard in order to steal sensitive information. This is a common method of how people are exploited in a number of ways, like email accounts, Facebook accounts, and even bank accounts. Keylogging is done without the knowledge of the person typing the keyboard.
It is fairly easy to get infected with malicious software including key loggers. Just as you should have anti-virus and anti-malware software protecting your computer, you should also consider having an anti-key logger program in the rare case your computer does become infected.
There are several products available online, some of which are free. You can search the Internet to find one that fits your needs. The following are some examples to get you started.
Cox does not endorse or support these products. These are only references to available products allowing you to proactively protect yourself from someone stealing your credentials to personal accounts by means of a key logger. Support for these programs is handled by the respective software manufacturers.