Quote |
If you run something under a host OS, I would think that you would still be vulnerable to malicious code from the host, such as software keyloggers. |
Quote |
As I mentioned before the advantage of the embedded linux does not use the applications on the host OS or the host OS for that matter |
Quote |
because most viruses,malware, trojans are written forwindows not linux this takes care of a great piece of the problem |
Quote |
The first thing I do is rebbot the machine, most places will let you do this. The second is perouse task manager to check for any keylogger apps or anything suspicious and kill anything I dont like. Most software keyloggers monitor certain apps like email or web browsers when opened are used to record keystrokes, this wont happen with me because I dont use any of host os apps. |
Quote |
I cut and paste them from a encrypted password app this app never exposes the actual password so this also eliminates shoulder surfing |
Quote |
I am not ever completely safe in these environments |
Quote |
Any further suggestions would be welcome. |
Quote |
lucky13: I suppose the "safest" bet would be to save your login details in cookies |