One of the serious threats to a user’s computer is a software program that might cause unwanted keystroke sequences to occur in order to hack someone’s identity. This form of an attack is increasing, infecting enterprise and personal computers, and caused by “organized malicious botnets,” said Daphne Yao, assistant professor of computer science at Virginia Tech. To combat the “spoofing […]
Post Tagged with: "keystroke"
Computer Scientist, Student Design Software to Combat Hacking Using Keystroke Anti-Spoofing Technique
on November 1, 2010 at 8:27 pm /
Subscribe by Email
Sign up to automatically receive the latest articles and tutorials in your Inbox.
Reach out & follow us
- TwitterFollow us on Twitter
- Google PlusJoin a prestigious circle
- RSS FeedSubscribe to our RSS Feed
- EmailReach out to us via email
- Moving a database container with Docker Swarm and Flocker
- ZeroDB: A database with end-to-end encryption
- DockerContainerExecutor merged in Hadoop-2.6
- Automating application deployments across clouds with Salt and Docker
- Virtual Machines or Containers? Maybe Both?
- Dray: UNIX pipes for Docker
- Deploying to Kubernetes with Panamax
- pavan kumar: sir please tell me the process how should i recover my data …
- finid: If you selected the replace windows 7 with ubuntu option, yo…
- pavan kumar: my previous os is windows 7 i installed ubuntu 13.04 when i …
- Zhou: The second solution doesn't help but the first xdaigonistic …
- finid: Ubuntu not detecting Windows 7/8/10 is a known issue, but yo…