One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by “organized malicious botnets,” said Daphne Yao, assistant professor of computer science at Virginia Tech. To combat the “spoofing […]
Post Tagged with: "keystroke"
Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique
on November 1, 2010 at 8:27 pm /
Subscribe by Email
Sign up to automatically receive the latest articles and tutorials in your Inbox.
Reach out & follow us
- TwitterFollow us on Twitter
- Google PlusJoin a prestigious circle
- RSS FeedSubscribe to our RSS Feed
- EmailReach out to us via email
- Automate the building and managing of Vagrant boxes and machine images using Packer and Atlas
- Package and run virtual machines as Docker containers with RancherVM
- 5 monitoring tools for Docker
- Will containers kill the virtual machine?
- Cloud Coding: Remote Pairing using Docker
- 6 points to ponder before deploying microservices and containers
- Running Super Privileged Containers in Red Hat Enterprise Linux Atomic Host