SECURITY MEASURES OF RANDVUL KEYBOARD

Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 3

Abstract

Phishing is a “con trick” by which consumers are sent email urporting to originate from legitimate services like banks or ther financial institutions. Phishing can be thought of as the marriage of social gineering and technology. The goal of a phisher is typically to learn information that allows him to access resources elonging to his victims. The most common type of phishing attack aims to obtain account numbers and passwords used for online banking, in order to either steal money from these ccounts or use them as “stepping stones” in money laundry schemes. In the latter type of situation, the phisher, who may belong to a riminal organization or a errorist organization, will transfer money between accounts hat he controls (without stealing money from either of them) in order to obscure the actual flow of funds from some payer to ome payee. Phishing is therefore not only of concern for otential victims and their financial institutions, but also to ociety at large[1]. In hacker's worlds, there is something called 'Key Logger'. The purpose of key logger is to log every key that you type in your keyboard, this includes every single personal nformation that you have typed in your keyboard while you surf he Net such as log in into your online banking. Once your assword has been logged, the hacker can use your nformation to their benefit[2]. Using Virtual Keyboard which ontains randomly generated keys adds another security layer o authenticate yourself to their system. Virtual Keyboard works just like regular keyboard, one thing is you don't type it in your keyboard. Rather, you will be using your mouse to type the assword by using virtual keyboard[3] .

Authors and Affiliations

Radha Damodaram , Dr. M. L. Valarmathi

Keywords

Related Articles

Fast Method for Two-dimensional Renyi’s Entropy-based Thresholding

Two-dimensional (2-D) thresholding can give a better segmentation than one-dimensional thresholding by taking the spatial correlation of the image. Unfortunately, the computational cost is an obstacle for the implementat...

BEYOND SIMULATED ANNEALING IN GRID SCHEDULING

In Grid Environment the number of resources and tasks to be scheduled is usually variable and dynamic in nature. This characteristic emphasizes the scheduling approach as a complex optimization problem. Scheduling is a k...

Software Reliability Growth Model with Logistic-Exponential Test-Effort Function and Analysis of Software Release Policy.

Abstract: software reliability is one of the important factors of software quality. Before software delivered in to market it is thoroughly checked and errors are removed. Every software industry wants to develop softwar...

Implementation and Performance Evaluation of the Gateway Discovery Approaches in the Integrated MANETInternet Scenario

The mobile ad hoc networks have become a major component of the future network development due to their ease of deployment, self-configurability, flexibility and independence on any existing network infrastructure. But...

A Study on Scheduling in Grid Environment

Grid Computing is a high performance computing environment that allows sharing of geographically distributed resources across multiple administrative domains and used to solve large scale computational demands. In the gr...

Download PDF file
  • EP ID EP97257
  • DOI -
  • Views 94
  • Downloads 0

How To Cite

Radha Damodaram, Dr. M. L. Valarmathi (2010). SECURITY MEASURES OF RANDVUL KEYBOARD. International Journal on Computer Science and Engineering, 2(3), 619-625. https://europub.co.uk/articles/-A-97257