One of the most common ways to gain control of a website, email account, bank account and what not is to have a key logger installed on the computer of the victim. After that everything you type will be saved into a hidden file, and if you are used to typing your passwords to logging into your website, email and bank the attacked will have access to all of them.
The practice of typing passwords is even more dangerous if you use shared computers, for instance where you work or on Internet cafes, as you never know what kind of malware may already be installed on that machine.
If you are not to type your passwords, what should you do? It’s simple: the good ol’ copy and paste. You basically need a password manager to store all your passwords (preferably in a encrypted fashion), and after that you just copy and paste the password you need.
The practice of typing passwords is even more dangerous if you use shared computers, for instance where you work or on Internet cafes, as you never know what kind of malware may already be installed on that machine.
If you are not to type your passwords, what should you do? It’s simple: the good ol’ copy and paste. You basically need a password manager to store all your passwords (preferably in a encrypted fashion), and after that you just copy and paste the password you need.
0 comments:
Post a Comment