How Do I Bypass Keyloggers? The Guaranteed Way to Avoid Having Your Keystrokes Maliciously Recorded

preview_player
Показать описание
⚠️ I hear about techniques to bypass keyloggers often. The problem is, keyloggers can log much more than keystrokes. There's really only one solution: avoid them in the first place.

More Ask Leo!

#askleo #keylogger #Maware
Рекомендации по теме
Комментарии
Автор

Thanks for the subtitles. Many of us who are from Latin America and want valuable information that is in English, we cannot know how to solve something because of the language.
Hopefully the Spanish subtitling of the English videos will be more frequent on YouTube. Excellent video!

Roberto
Автор

I have a new idea of how to bypass key loggers but I don’t know if the technology exists yet. What if you could install an external device to your computer that monitors all outgoing information and forces you to manually review it before sending it out? That would be a real pain in the ass to deal with but it could potentially work I think. Perhaps instead you could have a device that stores all your passwords encrypted and compares them to outgoing information to see if anything contains your passwords. It could also automatically block screenshots you didn’t manually initiate being sent or trigger a 2 factor authentication for you to send it. You could also implement facial recognition software or some sort or timeout feature that automatically disconnects your computer from the internet with a physical servo switch when you are away from it so no one can take control of your computer. Of course it’s best to keep you computer clean of malware but sometimes smart viruses can hide from detection so it’s better to take more precautions.

BimmerWon
Автор

The best advice. Do what you always should do to be secure. Thanks Leo for stating the obvious, again.

YoSoyFabrizioyTuNo
Автор

wow. that was interesting!
Question:
if a key-logging malicious programm were to upload screenshots online (or any data for that case), would that not be noticeable by the size of data uploaded? -or can said programm somehow compress the information automatically (if that were the case, in itself, that is pretty cool, however bad).
Thanks.

bizzhat
Автор

Thank You. This means only 1 logical problem... The operating system is flawed. They operating system needs to be able to be verified for integrity and separated from user files and unchangeable. Having a Linux Live CD could be useful but one would need to invest time and money into a good firewall, both hardware and software. It looks like we have a lot to go for information safety and security in the coming years. Great video!

hodonkain
Автор

Thanks for breaking this down in a simple way!!

lrwright
Автор

Damn dude this scard the shit out of me. I just a brand new MacBook and I installed Firefox and hardened all of its settings and hardened my firewall. I hope I'm good

downkoadRumble
Автор

Hi Leo, great video. Do recommend using anti key logging software such as spyrix? Seems like your saying that this software really isn't efficient and that the best thing to do is have anti virus software to eliminate malware. Do you have any recommendations on what to use to protect Mac computers?

detective
Автор

I’ve read that key loggers can come from bad web pages, pushing and pushing okay on pop up links to disappear. This could be a danger on an iOS device like iPad or iPhone? I reset everything and changed passwords

Joniyah
Автор

The best way is to (1) back up you entire clean OS drive (c:) every other week, (2) be sensitive to know you computer is infected, and (3) restore you entire OS drive upon sensing something is weird. DO NOT CLICK spooky free gift offer at YouTube comment area. If you click it, keylogger will be installed along with batch file to install other virus'.

uphillwish
Автор

What do you think of software like Keyscrambler?

nedludd
Автор

Hey Leo. In your opinion, would the following setup avoid installing Key/Screen loggers 100%?
Get a new PC. Assume it is 100% free of key/screen loggers. Now use it ONLY to access known good websites like one's bank, credit card, medical and other "trusted" websites ONLY. Never do email or searches using that PC. Can do Office stuff like word processing and spreadsheets but locally only... never going on the internet. Any flaws in this scenario? Your opinion please. Thanks.

RAPTORASDF
Автор

Can a keylogger plant a virus into any MS Word file that starts with a tilde + filename?

MS Word files that have a tilde before the real filename, if I have a sixth sense of cybersecurity, can be dangerous on a C drive and need to be jettisoned. For one thing, these files can be already corrupted, whether it is likely through a keylogger that causes the unforgiving "tildes" or whatever! These are my two bits.

charlessmith
Автор

I have multiple HDDs attached to my PC and I seem to have been given some malware by a file some classmates sent me, is it possible to figure out which HDD has the logger so that it can be replaced or would I be better off replacing all my hardrives, it's sounds expensive but someone has already found my information and is constantly attacking me and purchasing things, I've cancelled card thinking that was the issue but it appears they they got access via my pc. Again I'm a student so I only download software like Photoshop or Zbrush which are industry wide program so I doubt I got malware from that, and the only other files I open and download are from my profs and classmates. Please help. I've tried completely factory resetting the PC and fresh installing windows but it didn't seem to help

JasonGamer
Автор

Leo,
I get it. There is no solution that guarantees the detection or removal of keylogging software. My question is: If you knew or suspected there was keylogging on your machine, and you could not somehow find and remove it, what would you do?

joew
Автор

Can those details be sent to a specific email? If so, is there a possibility to check who installed it by that email?

avafull
Автор

I have always assumed that a password manager and automatic login bypass keystroke logging. Hmm, do automatic logins with like LastPass handshake and then send encrypted passwords?

fjack
Автор

OSK will bypass “dumb/hardware” key loggers, I may or may not have done some private investigation work and may or may not have gone with hardware that’s simple/no malware to bypass all antivirus. Since device was 100% passive simply logging what it sees on the USB I attached it to.

peterkwolek
Автор

Hey ..I am.using getintopc ...there might be virus in my sofware .
What to do to safe myself ??

lifeisbeautiful
Автор

Hi, what about Anti-Keylogger software like SpyShelter Firewall?

KierownikFestynu