Timeline for How can I avoid my password being harvested by key loggers from internet cafes?
Current License: CC BY-SA 3.0
32 events
when toggle format | what | by | license | comment | |
---|---|---|---|---|---|
Dec 21, 2016 at 3:16 | answer | added | Peteris | timeline score: 0 | |
Aug 6, 2015 at 9:54 | comment | added | kenorb | Another way (of many) is to use visual keyboard to type your passwords. | |
Dec 16, 2013 at 23:43 | answer | added | Deniz | timeline score: 2 | |
Dec 16, 2013 at 10:19 | answer | added | kefe | timeline score: 0 | |
Oct 28, 2011 at 19:13 | answer | added | steampowered | timeline score: 2 | |
Oct 5, 2011 at 15:45 | comment | added | Mithras | I just want to say that some years ago, before the iPad came out, I saw (ignorant) American tourists in Paris accessing their bank accounts on the provided computers at an internet cafe, and this was a cyber cafe where when I burned a CDROM I later found some malware "folders" added that were actually .exe's with icons that looked like folders. These tourists would have been 10 times safer buying a laptop and using that via Wifi. Of course these days people just bring iPads with them traveling. Much more convenient. But I still pity those tourists. My 2 cents. | |
Sep 6, 2011 at 3:56 | answer | added | Jimmy | timeline score: -1 | |
Aug 16, 2011 at 18:06 | answer | added | manpreet dhillon | timeline score: 0 | |
Aug 16, 2011 at 8:48 | comment | added | akira | related: security.stackexchange.com/questions/6248/… | |
Aug 16, 2011 at 8:45 | comment | added | akira | related: superuser.com/questions/323111/… | |
Aug 16, 2011 at 3:17 | answer | added | Zach | timeline score: 2 | |
Aug 15, 2011 at 22:24 | history | tweeted | twitter.com/#!/StackSecurity/status/103230686990839809 | ||
Aug 15, 2011 at 21:27 | answer | added | TheTechGuy | timeline score: -1 | |
Aug 15, 2011 at 20:12 | answer | added | Ali | timeline score: 2 | |
Aug 15, 2011 at 19:51 | answer | added | Crash893 | timeline score: 2 | |
Aug 15, 2011 at 19:51 | history | edited | AviD♦ |
edited tags
|
|
Aug 15, 2011 at 18:10 | answer | added | Joshua Carmody | timeline score: 3 | |
Aug 15, 2011 at 18:05 | history | migrated | from superuser.com (revisions) | ||
Aug 15, 2011 at 17:50 | answer | added | dr jimbob | timeline score: 17 | |
Aug 15, 2011 at 17:44 | answer | added | squareborg | timeline score: 0 | |
Aug 15, 2011 at 17:37 | answer | added | Daniel | timeline score: 2 | |
Aug 15, 2011 at 17:25 | answer | added | Sairam | timeline score: 4 | |
Aug 15, 2011 at 15:45 | answer | added | Moab | timeline score: 0 | |
Aug 15, 2011 at 15:34 | comment | added | Andreas Bonini |
I think the keylogger term got too popular compared to the alternative methods to obtain your password which don't involve logging keys at all. In fact, there is now a trend of calling unrelated trojans and viruses as "keylogger". Just keep in mind that the easiest way to get a specific password doesn't involve logging any keys.
|
|
Aug 15, 2011 at 15:02 | comment | added | bckbck | bring a portable linux stick with you. | |
Aug 15, 2011 at 14:58 | answer | added | psusi | timeline score: 0 | |
Aug 15, 2011 at 14:14 | answer | added | Kevin | timeline score: 5 | |
Aug 15, 2011 at 14:08 | answer | added | Diogo | timeline score: 18 | |
Aug 15, 2011 at 14:01 | answer | added | slhck | timeline score: 23 | |
Aug 15, 2011 at 14:00 | answer | added | Akash | timeline score: 6 | |
Aug 15, 2011 at 13:43 | answer | added | akira | timeline score: 50 | |
Aug 15, 2011 at 13:39 | history | asked | stickman | CC BY-SA 3.0 |