Livincr wrote:
Steven,
Are you saying that if I log off a secure web page or my email I have still left myself exposed?...I do mean LOG OUT not X out
Yes sir, you remain exposed IF it's a public accessed machine (heck even if it's a buddy's machine it could have something on it...but we all trust our buds with our money, right?!). The fact you are entering the data (log in name; account number; password; etc....) onto a secure server doesn't prevent the keylogging software installed on the infected machine from recording whatever you type. You can read about key logging nonsense here:
http://en.wikipedia.org/wiki/Keystroke_logging
Of particular import is this reality:
"2) Remote Access software Keyloggers are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to the monitor at a remote location. Remote communication is facilitated by one of four methods:
"Data is uploaded to a website or an ftp account.
Data is periodically emailed to a pre-defined email address.
Data is wirelessly transmitted by means of an attached hardware system.
It allows the monitor to log into the local machine via the internet or ethernet and access the logs stored on the target machine."
Translated, that means that Mr. Charlie doesn't even have to drop by the infected machine to pick up the key strokes it has logged....it's sent to him, at his leisure, in the comfort of wherever he may be. Heck, he could be one of us (

); installed the software on the target machine, and be getting the data back at his place ANYWHERE in the world.
It's just something to think about when you use those public machines. I don't desire to start anything like the "..always use a cab..." deally bob....but it's just a good idea to know the public machine you're using; who runs it; do they use state of the art software to find and remove keyloggers AND USE IT, running scans daily if not more frequently (and that is but one type of crud that can be used to capture data...just ONE...there are a ton....); and do ya trust the outfit where the public machine is??
Now, this warning is not just for Costa Rica....this is for any public terminal anywhere in the world.....it ain't just a CR thing....so I ain't hatin' on CR....
(Little story for diversion: I installed a key logging program on a subordinate staffer's work machine. Wasn't using the internet....had easy access to the machine.....and each and every night I accessed the hidden software program on that machine and found out what I needed to know. Invasion of privacy? Nah....I was the one in charge....all the computers in the office were mine....and I was able to prevent some MAJOR headaches for me by using the darn program....).
You guys with young family members who use the internet and do a lot of chatting? Think about installing such a piece of software on precious little Johnny's or darling 15 year old Janey's computer and you might just be very surprised at what is going on!!! Some parents radomly test their young ones for the usage of drugs. This concept is pretty much the same. I am NOT advocating either....if you've done a quality job in rearing, there's no need. Than again.... (here's a web site where you can what's out there:
http://www.keyloggingsoftware.com/ )