Most antivirus companies have already added known keyloggers to their databases, making protecting against keyloggers no different from protecting against other types of malicious program: install an antivirus product and keep its database up to date. However, since most antivirus products classify keyloggers as potentially malicious, or potentially undesirable programs, users should ensure that their antivirus product will, with default settings, detect this type of malware. If not, then the product should be configured accordingly, to ensure protection against most common keyloggers.
Let’s take a closer look at the methods that can be used to protect against unknown keyloggers or a keylogger designed to target a specific system.
Since the chief purpose of keyloggers is to get confidential data (bank card numbers, passwords, etc.), the most logical ways to protect against unknown keyloggers are as follows:
using one-time passwords or two-step authentication,
using a system with proactive protection designed to detect keylogging software,
Thanks to you both.
Jobeard, you actually answered the question that I had been meaning to ask for months (but I was too busy) which Adrian did not address. (As good as his reply was)
OK, The system is irrelevant. So you are saying, that if the KL is on one HardDrive, whatever drive/virtual drive I connect to attached to this compromised HD, the KL will still be active?
PS: Whilst I am here, the KL I had recorded my virtual keyboard. (I tested it as it was my KL but I did not necessarily trust the company I downloaded it from hence the original question)