SECURITY MEASURES OF RANDVUL KEYBOARD

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Phishing is a “con trick” by which consumers are sent email urporting to originate from legitimate services like banks or ther financial institutions. Phishing can be thought of as the marriage of social gineering and technology. The goal of a phisher is typically to learn information that allows him to access resources elonging to his victims. The most common type of phishing attack aims to obtain account numbers and passwords used for online banking, in order to either steal money from these ccounts or use them as “stepping stones” in money laundry schemes. In the latter type of situation, the phisher, who may belong to a riminal organization or a errorist organization, will transfer money between accounts hat he controls (without stealing money from either of them) in order to obscure the actual flow of funds from some payer to ome payee. Phishing is therefore not only of concern for otential victims and their financial institutions, but also to ociety at large[1]. In hacker's worlds, there is something called 'Key Logger'. The purpose of key logger is to log every key that you type in your keyboard, this includes every single personal nformation that you have typed in your keyboard while you surf he Net such as log in into your online banking. Once your assword has been logged, the hacker can use your nformation to their benefit[2]. Using Virtual Keyboard which ontains randomly generated keys adds another security layer o authenticate yourself to their system. Virtual Keyboard works just like regular keyboard, one thing is you don't type it in your keyboard. Rather, you will be using your mouse to type the assword by using virtual keyboard[3] .

Authors and Affiliations

Radha Damodaram , Dr. M. L. Valarmathi

Keywords

Related Articles

Global Cluster Cooperation Strategy in Mobile Ad Hoc Networks

MANETs or mobile ad hoc networks are a form of wireless networks which do not require a base station for providing network connectivity. Mobile ad hoc networks have many characteristics which distinguish them from other...

An optimum DV Hop Localization Algorithm for variety of topologies in Wireless Sensor Networks

Today wireless sensor networks has become a key technology for different kinds of smart environments. Sensor node localization which is determining where a given sensor node is physically or relatively located is extreme...

SELECT OF OPTIMAL SLEEP STATE IN ADAPTIVE SMAC USING DPM

Wireless sensor networks are networks with low power nodes and limited processing. The main problem in these networks is energy. This resource is not replaceable or rechargeable. Therefore, optimal energy consumption for...

Convergence of ART in Few Projections

Algebraic Reconstruction Technique (ART) is an iterative algorithm to obtain reconstruction from projections in a finite number of iterations. The present paper discuses the convergence achieved in small number of iterat...

Performance Estimation on Opportunistic Routing Protocol based on Reliability Analysis

This paper discuss various opportunistic routing algorithm which is based on broadcast nature of opportunistic network and also provide novel solution of routing which have less data loss. This research work proposed bro...

Download PDF file
  • EP ID EP97257
  • DOI -
  • Views 142
  • Downloads 0

How To Cite

Radha Damodaram, Dr. M. L. Valarmathi (2010). SECURITY MEASURES OF RANDVUL KEYBOARD. International Journal on Computer Science and Engineering, 2(3), 619-625. https://europub.co.uk/articles/-A-97257