If you can use/install an anti-keylogger program, that means that someone else can install a rootkit as well. You can try to install or startup a virtual keyboard or some other tool and see if that works. If so, the machine is probably not safe to start with. It's probably safer to use one that you can't mess with.
Take your own laptop, ipad, smartphone, and use wifi at a local bar. Use https-everywhere if possible, or set gmail, facebook etc to use https only. Use VPN if you're really worried.
NB: I can imagine that a machine is not safe and you can mess with it. Someone uses it and then the session is closed. If the machine is reset back to a clean snapshot after each closed session, it might be relatively safe, in the sense that if you stay away from unsafe sites, you'll probably stay clean. So if it appears to work like that, you can start a new session, browse facebook, hotmail, gmail, and stay safe. Then you start a new session, browse whatever unsafe site you want, don't login to gmail etc....
4In all honesty.... you can't. Don't use public terminals. There is no way to know what viruses, malware, rootkits, keyloggers, or mouse/screen recorders are installed. There's no way to know if the host is snooping on the network packets either. Never enter or view private data on a public terminal, and always use HTTPS or encryption when using public Wifi. – Darth Android – 2013-06-27T03:19:58.027
1Theoretically, if there is an opportunity to insert network device a public terminal, your protected laptop can use protected network protocol and connect to protected server. Cloak tent that will hide you, monitor, keyboard, and your actions and will have elements of anti sniper protection. Also a good idea to take a set of stun grenades and install a smoke screen. – STTR – 2013-06-27T03:40:43.337