top of page

F.A.Q. - ACS EndpointLock

Features

What is EndpointLock Desktop?

EndpointLock is a software program that encrypts your keystrokes between the keyboard and your desktop applications and Internet browsers, so that keyloggers cannot steal your personal or financial information.

 

EndpointLock works with all major browsers to block keyloggers from grabbing information going to internet applications. EndpointLock also protects desktop applications like MS Office, bookkeeping software such as Quickbooks and TurboTax, Skype and other messaging programs, and Windows “login” screens.

What’s the difference between EndpointLock and other anti-keyloggers?
EndpointLock takes a unique approach to protect your confidential information. When you type on your keyboard, EndpointLock encrypts all keystrokes at the point of origin (your keyboard), then carries those encrypted keystrokes to any browser or desktop application via its own proprietary path, bypassing the place where keyloggers reside. This way, existing and new keyloggers can’t get their hands on your keystrokes.
 
In addition to anti-keylogging, EndpointLock prevents screen-scraping malware from taking screen shots while you are in any application, and warns you of click-jacking attacks. The EndpointLock anti-subversion feature detects untrusted drivers and kernel level compromises, and displays a warning containing the location of any suspect driver.

What applications and browsers does EndpointLock protect?
EndpointLock protects all applications and browsers with keystroke encryption. For Mac users, Apple protects many if not all browser password fields.

Will EndpointLock work with any keyboard?
EndpointLock works with PS/2 keyboards as well as USB keyboards, including wireless keyboards. Certain enhancement drivers for advanced specialty keyboards may not function when EndpointLock is enabled.

Does EndpointLock protect a USB keyboard plugged into my laptop?
EndpointLock protects typing from all active keyboards; the laptop keyboard and/or USB keyboard and/or PS/2 keyboard.

Does EndpointLock hide my keystrokes when I am using Remote Desktop programs?
No. The keystrokes going to Remote Desktop Connection programs cannot be hidden by the current EndpointLock releases

 

 

How do desktop keyloggers work?
A keylogger is a piece of software that records every keystroke you make on a keyboard. Malicious (“malware”) keyloggers are designed to avoid detection from anti-virus programs and invade your computer without your knowledge or consent when you install a program, get an email, visit a website or otherwise use your computer online. Once installed, the keylogger records all your key strokes, and then sends your personal and confidential information back to the cyber criminal.

Do I still need my anti-virus product suite?

Yes. EndpointLock™ prevents keyloggers from seeing what you type. You still need programs to keep viruses out of files (anti-virus/anti-adware) and to keep intruders out of your machine (personal firewall).

If my computer is infected with a keylogger, will EndpointLock protect me?

Yes. EndpointLock will protect the keys you type inside your browser, even if your anti-malware programs do not have current signatures. When the EndpointLock light is green and says “On”, (or the “shield” icon in the notification area in the lower right of your screen flashes as you type), EndpointLock is protecting your keystrokes from keyloggers.

What is “screen scraping” (aka “screen logging”)? Does EndpointLock protect me?
EndpointLock includes a blocker to hide your screen from screen loggers. “Screen scraping” loggers capture snapshots of your screen each time you make a change. EndpointLock does not stop the loggers from attempting to steal — it sends them all black screens!

What is clickjacking? Does EndpointLock protect me?
Yes, one of EndpointLock’s  security features is “Clickjack warning.”

Clickjacking is a type of cyber threat whereby an invisible link or button containing malicious code can be placed over a legitimate link or button on any website without the user’s knowledge. This malicious link could also appear as a non-threatening link that essentially sends the user to another website without their knowledge. When a user clicks on an unseen link the cyber criminal has the ability to take control of that computer and download keystroke loggers and other malware, which can wipe out the computer’s hard drive.
 
In another example of clickjacking, a web user thinks they are clicking a legitimate button to close a dialog box — but the button click actually deletes all the email messages in their Gmail account. Or, a user believes they are clicking on a button to decline to take a survey, when they are actually transferring money from their bank. Cyber criminals use this technique to raise an article’s Digg score or get paid for a pay-for-click advertisement.
 
The EndpointLock anti-clickjacking feature helps prevent against these types of attacks by making the clickjacking locations visible to the user. EndpointLock highlights invisible buttons and links with red dashes, showing the end user that the web page that they are on may contain malicious code. EndpointLock also highlights in red dashes any ads, links, or content that is being served from a third-party site. When you go to these third-party sites you should always use caution, making sure you are on a legitimate site.

 

FAQeplfeattop
What can we assist you with?
ACS EndpointLock
ACS ProtectID
ACS EndpointLock Mobile 
Browser
Installation

How can we help?

bottom of page