Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

 Detecting Keylogger, Which program does that?

views
     
TSExCrIpT
post Nov 19 2006, 11:49 AM, updated 20y ago

Regular
******
Senior Member
1,672 posts

Joined: Jan 2003


Can you recommend me programs that can detect key logger in my system.
Much appreciated.

And btw keylogger is the only program that can record your key strokes and steal your password right
eXPeri3nc3
post Nov 19 2006, 02:17 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(ExCrIpT @ Nov 19 2006, 12:49 PM)
Can you recommend me programs that can detect key logger in my system.
Much appreciated.

And btw keylogger is the only program that can record your key strokes and steal your password right
*
Antivirus will detect keyloggers. smile.gif
Are you using any AV's currently?
cutun1217
post Dec 11 2006, 04:55 PM

Getting Started
**
Junior Member
200 posts

Joined: Mar 2005


most of AV can detect key-loger. but there are some key logger that are hard to be detected. i have tried to use Norton to scan but cannot. the only way is to remove manually.
most of key logger will save all info in one file then send to an email add. so you should have internet traffic controll progeam running and detect any in/out package. of course u have to eliminate your web surfing that time. you may find some clue to remove the key logger.
wish u luck,
FireDaemon
post Dec 17 2006, 12:33 AM

Getting Started
**
Junior Member
55 posts

Joined: Dec 2004
From: Perak


IMO , keylogger is classified as spyware programs , if you use spydefense or AVG anti-spyware should be able to remove all
cuebiz
post Dec 18 2006, 04:32 PM

Enthusiast
*****
Senior Member
992 posts

Joined: Aug 2006
From: Bolehland


You can try Spy Sweeper. It is a bit expensive but it is highly rated
FireDaemon
post Dec 19 2006, 10:00 PM

Getting Started
**
Junior Member
55 posts

Joined: Dec 2004
From: Perak


highly rated , yeah , maybe a cocktail of softwares will do

1. Spybot
2. Arovax Anti-Spyware
3. AVG Anti-Spyware
4. SpySweeper
5. Hijackthis with tutorials and manuals biggrin.gif
scorps
post Dec 19 2006, 11:35 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(FireDaemon @ Dec 19 2006, 11:00 PM)
highly rated , yeah , maybe a cocktail of softwares will do

1. Spybot
2. Arovax Anti-Spyware
3. AVG Anti-Spyware
4. SpySweeper
5. Hijackthis with tutorials and manuals biggrin.gif
*
lavasoft ad aware se best...
must be updated always
FireDaemon
post Dec 21 2006, 10:16 PM

Getting Started
**
Junior Member
55 posts

Joined: Dec 2004
From: Perak


yeah , but one is usually not enough , because of the signatures biggrin.gif
CrazyNut
post Dec 21 2006, 10:34 PM

Casual
***
Junior Member
434 posts

Joined: Mar 2005
From: Subang Jaya
Question!

Zone Alarm detected a keylogger- Driver\SynTP at system32\drivers. Does it spell trouble?
natakaasd
post Dec 22 2006, 07:33 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


If ZA detects it, YES. Quite a number of Malware hide in the system32\drivers folder in Win XP. If possible, do the following:-

1. HijackThis Log
2. Kaspersky / TrendMicro Online Scanner Log
3. System Repair Engineer Log

Post a topic at Technical Support (I believe you know that, right, CrazyNut?).

Cheers!
CrazyNut
post Dec 22 2006, 01:48 PM

Casual
***
Junior Member
434 posts

Joined: Mar 2005
From: Subang Jaya
Hi natakaasd, thanks for the reply.

Aww, and it was on my brand new Dell 6400 as well..I made sure I have my firewall on before I surfed the net..anyhow, will do the scans and post in Tech Support.

Thanks once again! smile.gif
scorps
post Dec 23 2006, 01:54 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(CrazyNut @ Dec 21 2006, 11:34 PM)
Question!

Zone Alarm detected a keylogger- Driver\SynTP at system32\drivers. Does it spell trouble?
*
there is so many keylogger on the website,
but very hard to find the free one..
always need for registration,

but i'm very worry about keylogger in the cybercafe(cc) drool.gif
do you think that many cc owner's install this program and steal our password email, and all information when we using their cc???

how to prevent this??
suggestion needed...
natakaasd
post Dec 25 2006, 12:44 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


Prevention? Use Virtual Keyboards... No doubt, quite a number of SMART Keyloggers can trace down to everything. They Print Screen, Trace Vitual Keyboards and everything. I guess for safety sake, Don't Use the computer at all. Hide in the mountains. LOL. Joking only. Cheers!
bysquashy
post Dec 25 2006, 12:53 PM

Wireless Bliss [3GPP R14]
*******
Senior Member
2,884 posts

Joined: Sep 2006
From: Mummy


There are hardware keyloggers too, but I don't think we want to get into that
natakaasd
post Dec 25 2006, 01:10 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


Hardware Keyloggers? Oh bother. Don't use a keyboard. tongue.gif. CHeers!
scorps
post Jan 2 2007, 03:11 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(natakaasd @ Dec 25 2006, 02:10 PM)
Hardware Keyloggers? Oh bother. Don't use a keyboard. tongue.gif. CHeers!
*
khkhokohkohkho..
without keyboard, how the comp will be turn on??
eXPeri3nc3
post Jan 2 2007, 03:18 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 2 2007, 03:11 PM)
khkhokohkohkho..
without keyboard, how the comp will be turn on??
*
you need to use keyboard to turn on the pc meh?
unless you need password to access the pc.

Or maybe you need to type when you do your work... icon_idea.gif

Windows On-Screen Keyboard... Lol! xD
scorps
post Jan 2 2007, 03:21 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 2 2007, 04:18 PM)
you need to use keyboard to turn on the pc meh?
unless you need password to access the pc.

Or maybe you need to type when you do your work... icon_idea.gif

Windows On-Screen Keyboard... Lol! xD
*
yes comp with password protected,

eXPeri3nc3
post Jan 2 2007, 08:07 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



Hmm just a doubt, can hardware keyloggers capture wireless keyboard inputs? icon_idea.gif since it's not parallel ports.
natakaasd
post Jan 3 2007, 06:44 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


I feel they can. Some of the Hardware keyloggers use TEMPEST to detect keystrokes. This is the MOST Advance method, and very few methods to prevent it. But I guess, If so desperate until use TEMPEST, shakehead.gif, Don't bother, much easier. biggrin.gif Cheers!

This post has been edited by natakaasd: Jan 3 2007, 06:44 AM
eXPeri3nc3
post Jan 3 2007, 11:29 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 3 2007, 06:44 AM)
I feel they can. Some of the Hardware keyloggers use TEMPEST to detect keystrokes. This is the MOST Advance method, and very few methods to prevent it. But I guess, If so desperate until use TEMPEST, shakehead.gif, Don't bother, much easier. biggrin.gif Cheers!
*
Hmm... Dunno if this is the right quote but...

QUOTE(Wikipedia.org)
TEMPEST is a codename referring to investigations and studies of compromising emanations (CE). Compromising emanations are defined as unintentionial intelligence-bearing signals which, if intercepted and analyzed, disclose the national security information transmitted, received, handled or otherwise processed by any information-processing equipment.


It seems that it's actually used by the government and now for publicity use. sweat.gif
That also means nothing is impossible in this world... laugh.gif
natakaasd
post Jan 3 2007, 04:17 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


So, Privacy is no longer private. (=.=) Bad news, isn't it? Cheers...
eXPeri3nc3
post Jan 3 2007, 05:43 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 3 2007, 04:17 PM)
So, Privacy is no longer private. (=.=) Bad news, isn't it? Cheers...
*
Ah, anyway I don't think those keyloggers will be installed on our pcs right?
It isn't that we're using credit cards or paypal accounts...
We usually forum, chat, find stuffs and etc...

I don't think that they'll keylog us to see our private "chatting" right? brows.gif

Last but not least, keylogs are nasty and irritant. Once infected very hard to remove.
scorps
post Jan 4 2007, 03:37 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 3 2007, 06:43 PM)
Last but not least, keylogs are nasty and irritant. Once infected very hard to remove.
*
are u sure about this??
how about if using anti keylogger??
i think all av can detect threat that made by key logger,
but the av must update always...
natakaasd
post Jan 4 2007, 09:47 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


(=.=) I disagree. Keyloggers can be removed, but for some cases, it is DAMN hard. Imagine having the keylogger working together with a Rootkit. Your computer is really condemned for a very long removal process...

Not every AV can remove Keyloggers. Some are practically useless. Cheers!
eXPeri3nc3
post Jan 4 2007, 10:50 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 03:37 AM)
are u sure about this??
how about if using anti keylogger??
i think all av can detect threat that made by key logger,
but the av must update always...
*
I don't personally think so.
Obviously you haven't use *undetected* keyloggers, I mean undetected.
There are private coded stuffs which hell lots of AV can't detect during release until users report that particular file.

QUOTE(natakaasd @ Jan 4 2007, 09:47 AM)
(=.=) I disagree. Keyloggers can be removed, but for some cases, it is DAMN hard. Imagine having the keylogger working together with a Rootkit. Your computer is really condemned for a very long removal process...

Not every AV can remove Keyloggers. Some are practically useless. Cheers!
*
Wait a min, who you're disagreeing with? Just to make sure. smile.gif
scorps
post Jan 4 2007, 11:19 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 4 2007, 11:50 AM)
I don't personally think so.
Obviously you haven't use *undetected* keyloggers, I mean undetected.
There are private coded stuffs which hell lots of AV can't detect during release until users report that particular file.
Wait a min, who you're disagreeing with? Just to make sure. smile.gif
*
thanks a lot for your info..
that news for me..
so u can give example of name key logger that can't detect by av&anti key logger??
just to know..


eXPeri3nc3
post Jan 4 2007, 11:31 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 11:19 AM)
thanks a lot for your info..
that news for me..
so u can give example of name key logger that can't detect by av&anti key logger??
just to know..
*

    To name a few:
  • Perfect keylogger pro edition - recoded and re-edited for customer
  • *underground* submissions such as elitec0ders keylogger, which is quite stealth and injects into explorer.exe

*Forgot to close tag doh.gif

This post has been edited by eXPeri3nc3: Jan 4 2007, 11:31 AM
scorps
post Jan 4 2007, 12:07 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 4 2007, 12:31 PM)
    To name a few:
  • Perfect keylogger pro edition - recoded and re-edited for customer
  • *underground* submissions such as elitec0ders keylogger, which is quite stealth and injects into explorer.exe

*Forgot to close tag doh.gif
*
have u try ardamax keylogger??
it is can detect or not?
sometimes santi psyware also can detect the key logger files and heal it???
it is true??
eXPeri3nc3
post Jan 4 2007, 01:02 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 4 2007, 12:07 PM)
have u try ardamax keylogger??
it is can detect or not?
sometimes santi psyware also can detect the key logger files and heal it???
it is true??
*
No, I had not tried it before.

Yes, sometimes anti spywares can remove it... seldom and rare.
natakaasd
post Jan 4 2007, 02:12 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


Who I am disagreeing with? LOL. scorps, not eXPeri3nc3. HAHA.

In fact, injecting into Explorer.EXE is not that hard to detect tongue.gif. Use SREng. It will show every thread in every Running Program (PID). Cheers!
scorps
post Jan 5 2007, 04:55 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



hahahha..
i know becoz i'm still newbie

user posted image

how about that picture??
comment
natakaasd
post Jan 5 2007, 07:25 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. tongue.gif

The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers!
scorps
post Jan 5 2007, 08:29 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(natakaasd @ Jan 5 2007, 08:25 AM)
The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. tongue.gif

The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers!
*
i don't get what u said above,
explain more..
please,
eXPeri3nc3
post Jan 5 2007, 11:21 AM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 4 2007, 02:12 PM)
Who I am disagreeing with? LOL. scorps, not eXPeri3nc3. HAHA.

In fact, injecting into Explorer.EXE is not that hard to detect tongue.gif. Use SREng. It will show every thread in every Running Program (PID). Cheers!
*
Some can hide their PID don't forget icon_idea.gif

QUOTE(scorps @ Jan 5 2007, 04:55 AM)
hahahha..
i know becoz i'm still newbie

user posted image

how about that picture??
comment
*
Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.

QUOTE(natakaasd @ Jan 5 2007, 07:25 AM)
The so called "Invisibility" is COMMON features in Malware (Spyware/Adware/Malicious Code/Trojan Horses etc) itself. tongue.gif

The Invisibility against Process Viewers. This aspect needs to be tested. Most of the time, It is purely Thread injection OR API Hooking. Cheers!
*
As the above.

QUOTE(scorps @ Jan 5 2007, 08:29 AM)
i don't get what u said above,
explain more..
please,
*
As the above.
scorps
post Jan 6 2007, 01:33 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



but sometimes key logger also good for monitoring our kids that surf internet,
we will know what they do when surf internet,
and if we see in the keylogger viewer that they go to porn sites,
then we can give them a warning.. tongue.gif
scorps
post Jan 6 2007, 10:28 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 5 2007, 12:21 PM)
Some can hide their PID don't forget icon_idea.gif
Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.
*
but when i scan with avg av, it still can detect and heal it??
how to make it invisible to all av??
hhehehehe blush.gif
natakaasd
post Jan 6 2007, 01:31 PM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers!
eXPeri3nc3
post Jan 6 2007, 10:23 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 6 2007, 01:33 AM)
but sometimes  key logger also good for monitoring our kids that surf internet,
we will know what they do when surf internet,
and if we see in the keylogger viewer that they go to porn sites,
then we can give them a warning.. tongue.gif
*
Depends on how you wanna use it la... icon_idea.gif.
Monitor your gf to know what the fish she's been bitchin around icon_idea.gif laugh.gif

QUOTE(scorps @ Jan 6 2007, 10:28 AM)
but when i scan with avg av, it still can detect and heal it??
how to make it invisible to all av??
hhehehehe blush.gif
*
I know some ways... But not teaching you tongue.gif.
Those "guys" have way elite ways to do so. notworthy.gif

QUOTE(natakaasd @ Jan 6 2007, 01:31 PM)
Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers!
*
yeah. smile.gif
wodenus
post Jan 6 2007, 10:35 PM

Tree Octopus
********
All Stars
14,990 posts

Joined: Jan 2003
QUOTE(eXPeri3nc3 @ Jan 5 2007, 11:21 AM)
Some can hide their PID don't forget icon_idea.gif
Stealth, decides to stay in root and hides itself from detection, uses injection and rootkit to hide it's PID.
As the above.
As the above.
*
Many other ways -- filename, file size... smile.gif
eXPeri3nc3
post Jan 6 2007, 10:43 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(wodenus @ Jan 6 2007, 10:35 PM)
Many other ways -- filename, file size... smile.gif
*
yeah, but some AV's still can detect it...
They modify the headers... API's... Loops... rclxub.gif
scorps
post Jan 6 2007, 11:40 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(natakaasd @ Jan 6 2007, 02:31 PM)
Many AVs use signature to detect malware. If the Keylogger is NOT Blacklisted by the particular AV company (As your case, AVG [You ought to change, it is not that good anymore. my opinion. Cheers!]), You CAN"T detect it. I am not sure about NOD32, as it uses heuristics instead. Cheers!
*
do you say i need to change my av??
right??

bro what is PID,api??


zamanjaafar
post Jan 7 2007, 05:42 AM

NOT DUPIN' SINCE '03
******
Senior Member
1,122 posts

Joined: Jan 2003


its kinda dangerous these...i know bcoz i used once on some pc in labs and managed to get some ppls friendster accounts. i did a few things, but that was me few years ago...-nothing major done.

now even thinking of keyloggers make me paranoid. i use on screen keyboard to fill in login info on bank sites. is that safe?
scorps
post Jan 7 2007, 07:48 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



user posted image
and how about this?? tongue.gif

i not try this yet,
who have try this before,can share the experience??
eXPeri3nc3
post Jan 7 2007, 12:28 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 6 2007, 11:40 PM)
do you say i need to change my av??
right??

bro what is PID,api??
*
DUDE, google!

API Definition from Google
QUOTE
Application Programming Interface. The interface (calling conventions) by which an application program accesses operating system and other services. An API is defined at source code level and provides a level of abstraction between the application and the kernel (or other privileged utilities) to ensure the portability of the code.


PID Definition from Google
QUOTE
Process Identifier; each process has a unique PID assigned by the operating system


QUOTE(scorps @ Jan 7 2007, 07:48 AM)
user posted image
and how about this?? tongue.gif

i not try this yet,
who have try this before,can share the experience??
*
This looks awfully familiar, not very sure tho'...
Is it PKL?
scorps
post Jan 7 2007, 02:49 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(eXPeri3nc3 @ Jan 7 2007, 01:28 PM)
This looks awfully familiar, not very sure tho'...
Is it PKL?
*
not,
i can't tell to you that name ...
sori bro...
but i think u can find it by yourself in the internet

and here also something i want to share,

user posted image
very interesting,but i don't try this settings yet,
user posted image

but i think maybe the firewall can deny this setting and also the av inside the computer

This post has been edited by scorps: Jan 7 2007, 02:51 PM
eXPeri3nc3
post Jan 7 2007, 09:00 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 7 2007, 02:49 PM)
not,
i can't tell to you that name ...
sori bro...
but i think u can find it by yourself in the internet

and here also something i want to share,

user posted image
very interesting,but i don't try this settings yet,
user posted image

but i think maybe the firewall can deny this setting and also the av inside the computer
*
Oh yeahz, btw, if there's a GUI for a kl... means... it sucks... lol laugh.gif
Hard coded with command lines only is hard to detect... thumbup.gif
natakaasd
post Jan 8 2007, 08:52 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


In fact, hard coded Keyloggers are only "usable" by the pros. So, we have GUI to help the "not-so-pros" like me and you. HAHA. Who wants to be a hacker by profession? Be a pro first. LOL.

Do not underestimate the good and bad about Keyloggers. You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers!
super macgyver
post Jan 8 2007, 09:50 AM

★~13k Spam Club~★
********
All Stars
19,324 posts

Joined: Jan 2003



QUOTE(natakaasd @ Jan 8 2007, 08:52 AM)
In fact, hard coded Keyloggers are only "usable" by the pros. So, we have GUI to help the "not-so-pros" like me and you. HAHA. Who wants to be a hacker by profession? Be a pro first. LOL.

Do not underestimate the good and bad about Keyloggers. You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers!
*
then how can u differenciate them?
natakaasd
post Jan 8 2007, 09:54 AM

Look at all my stars!!
*******
Senior Member
2,188 posts

Joined: Nov 2005


Don't differentiate between them. Just don't use them. unless of GREAT necessity. LOL. Cheers!
scorps
post Jan 8 2007, 10:13 AM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(natakaasd @ Jan 8 2007, 09:52 AM)
You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers!
*
hehehhehe..
this quite dangerous thing...

eXPeri3nc3
post Jan 8 2007, 02:28 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(natakaasd @ Jan 8 2007, 08:52 AM)
In fact, hard coded Keyloggers are only "usable" by the pros. So, we have GUI to help the "not-so-pros" like me and you. HAHA. Who wants to be a hacker by profession? Be a pro first. LOL.

Do not underestimate the good and bad about Keyloggers. You might be able to snoop at others, but beware, some keyloggers are REAL keyloggers. The author snoops at you instead. Cheers!
*
Lol, came across a few. Lol. laugh.gif

QUOTE(natakaasd @ Jan 8 2007, 09:54 AM)
Don't differentiate between them. Just don't use them. unless of GREAT necessity. LOL. Cheers!
*
Agree icon_rolleyes.gif I use it just to test on how keylogger works and I keylogged my own pc as I'm away from my house that time. My friends really did some stuffs to mah pc and later I flame them back like hell whistling.gif

QUOTE(scorps @ Jan 8 2007, 10:13 AM)
hehehhehe..
this quite dangerous thing...
*
If you don't know what you're doing, you're actually playing with fire.
cashboy
post Jan 12 2007, 12:37 PM

Casual
***
Junior Member
455 posts

Joined: Oct 2006

does formatting the HDD can remove keylogger?
scorps
post Jan 12 2007, 12:52 PM

Something you call love, but I call sex
*******
Senior Member
9,572 posts

Joined: Jun 2005
From: Terengganu Darul Iman



QUOTE(cashboy @ Jan 12 2007, 01:37 PM)
does formatting the HDD can remove keylogger?
*
i think yes,
but u need to confirm if the .exe file still can activate itself after u format,
and maybe .exe files in another partition,
so u need t clean all files in your hdd disk by scanning witha antikeylogge..
eXPeri3nc3
post Jan 12 2007, 04:40 PM

It's coming! 3ɔu3ıɹǝdxǝ ♥
*******
Senior Member
9,257 posts

Joined: Aug 2005
From: Not so sure myself Status: 1+3+3=7



QUOTE(scorps @ Jan 12 2007, 12:52 PM)
i think yes,
but u need to confirm if the .exe file still can activate itself after u format,
and maybe .exe files in another partition,
so u need t clean all files in your hdd disk by scanning witha antikeylogge..
*
Agree, and that's why you need to run a full system scan with your AV's to determine that it's clean. wink.gif

 

Change to:
| Lo-Fi Version
0.0266sec    0.59    5 queries    GZIP Disabled
Time is now: 22nd December 2025 - 02:25 AM