© yellowj – Fotolia.comOne of the most common ways to gain control of a website, email account, bank account and what not is to have a key logger installed on the computer of the victim. After that everything you type will be saved into a hidden file, and if you are used to typing your passwords to logging into your website, email and bank the attacked will have access to all of them.
POMA MEMBER ACCESS ONLY
The full text of this page is available only to POMA members.
If you are a member of POMA, please click the button at the bottom of the page login; otherwise, please consider becoming a member of POMA today.
Thanks for your interest,
POMA Management