View Single Post
  #148  
Old May 18th 21, 05:57 PM posted to microsoft.public.windowsxp.general
Paul[_32_]
external usenet poster
 
Posts: 11,873
Default O.T. Missing Folder/files

Robert in CA wrote:
I think I do have Quick time but I do believe I need that for
something. Maybe Dell Imaging uses it I forget. I think I
uninstalled it once then needed it so re-installed it.


That could be it.

Well the AV programs are there for a reason but I know what
you mean about companies getting carried away. What would
you recommend? I just want as secure a computer as I possibly
can have. As I said, I get hit with Avast pop-up warnings even on
eBay or when I'm watching the news.

I thought I would show you my programs/downloads on the 780
I also went into task manager. and maybe you can spot something
that shouldn't be there?


I took a look at list of pictures, every one, but a name in the list could
be a "disguise".

They tested some anti-keyloggers here, and the results
for one of them, it seems to only have signature analysis.
And you could probably get signature analysis from MalwareBytes
when it scans. One of the keyloggers only seems to do a good
job on a particular keylogger. The keylogging idea here, is
a surrogate for anything which filters input and has hooked
into things we don't feel it should be hooking. I can't be
sure this is a keylogger, or just a hotkey somewhere. But
if the backspace is generally blocked, without any specific
window having the focus, that's not a normal behavior.

https://www.raymond.cc/blog/what-is-...re-software/2/

Even if you installed a "test keylogger" on the system, you
can't do a fair test, because many things detect the "injection"
of the software and not its "actions". If you were targeted
by someone, the "injection" step would not be detected, and then
only the "actions" of the item, would identify its presence.

It's like if we used the EICAR test file, as a means to validate
AV software. Sure, most all of them detect EICAR, so at least
you "know the code isn't dead", but as for real protection,
you really have no idea how it would do against a practical threat.

Summary: Maybe an MBAM scan can see it. I don't think these other
candidates are exactly "hot sauce".

Paul
Ads