SECURITY MEASURES OF RANDVUL KEYBOARD
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3
Abstract
Phishing is a “con trick” by which consumers are sent email urporting to originate from legitimate services like banks or ther financial institutions. Phishing can be thought of as the marriage of social gineering and technology. The goal of a phisher is typically to learn information that allows him to access resources elonging to his victims. The most common type of phishing attack aims to obtain account numbers and passwords used for online banking, in order to either steal money from these ccounts or use them as “stepping stones” in money laundry schemes. In the latter type of situation, the phisher, who may belong to a riminal organization or a errorist organization, will transfer money between accounts hat he controls (without stealing money from either of them) in order to obscure the actual flow of funds from some payer to ome payee. Phishing is therefore not only of concern for otential victims and their financial institutions, but also to ociety at large[1]. In hacker's worlds, there is something called 'Key Logger'. The purpose of key logger is to log every key that you type in your keyboard, this includes every single personal nformation that you have typed in your keyboard while you surf he Net such as log in into your online banking. Once your assword has been logged, the hacker can use your nformation to their benefit[2]. Using Virtual Keyboard which ontains randomly generated keys adds another security layer o authenticate yourself to their system. Virtual Keyboard works just like regular keyboard, one thing is you don't type it in your keyboard. Rather, you will be using your mouse to type the assword by using virtual keyboard[3] .
Authors and Affiliations
Radha Damodaram , Dr. M. L. Valarmathi
Color and Texture Based Identification and Classification of food Grains using different Color Models and Haralick features
This paper presents the study on identification and classification of food grains using different color models such as L*a*b, HSV, HSI and YCbCr by combining color and texture features without performing preprocessing. T...
Frequent Data Itemset Mining Using VS_Apriori Algorithms
The organization, management and accessing of information in better manner in various data warehouse applications have been active areas of research for many researchers for more han last two decades. The work resented i...
An analysis of cross avoidance techniques in optical multistage interconnection networks
It is expected that users of telecommunication services such as Internet, Web browsing, and tele-education will increase dramatically. This has greatly increased the demand for high bandwidth and high capacity communicat...
HIERARCHICAL DOCUMENT ORGANIZATION AND RETRIEVAL BASED ON THEMES FOR NEWS TRACKS
Organizing text documents is an important task and there are also numbers of strategies available in it. A good document clustering approach can assist computers in organizing the document corpus automatically into a mea...
WebParF:A Web Partitioning Framework for Parallel Crawler
With the ever proliferating size and scale of the WWW [1], efficient ways of exploring content are of increasing importance. How can we efficiently retrieve information from it through crawling? And in this “era of tera”...