If this is your first visit, be sure to check out the FAQ by clicking the link above. You may have to register before you can post: click the register link above to proceed. To start viewing messages, select the forum that you want to visit from the selection below. |
|
|
|
Thread Tools | Display Modes |
#1
|
|||
|
|||
Keylogger Question
A friend of our family has recently gotten a divorce, and her husband had
some computer know how. He left a computer for her to use, but increasingly she is becoming worried that perhaps a keylogger or other some such software has been left behind as a present because periodically he says things that she doesn't think he should even know about. She knows that he installed something on their daughter's pc that records information and emails it to him, so she's worried that he might have that on her pc as well. She doesn't know what it was, or what it was called. I know that most keyloggers with email capability have the ability to hide from normal detection, so I was wondering if anybody had any suggestions on where to look for this. I've thought about maybe installing zonealarm and seeing when/if something is trying to email information to him, etc. I also seem to remember seeing a program on the net that would show all programs loaded/running on a system, including items like Magic Folders. I can't find that one again, but thought maybe somebody on here might have heard/seen it, or have any other suggestions on tracking this down. I've thought of just blowing the box away and reloading, but he took all of the software that they had when he moved and they aren't exactly getting along so well that he'd let her have it all to reload. Any suggestions would be helpful. Thanks. |
Ads |
#2
|
|||
|
|||
Keylogger Question
Here is a small free program for detecting keyloggers:
http://dewasoft.com/privacy/kldetector.htm Caution: It may flag something legitimate. -- Hope this helps. Let us know. Wes MS-MVP Windows Shell/User In , Johnnycat hunted and pecked: A friend of our family has recently gotten a divorce, and her husband had some computer know how. He left a computer for her to use, but increasingly she is becoming worried that perhaps a keylogger or other some such software has been left behind as a present because periodically he says things that she doesn't think he should even know about. She knows that he installed something on their daughter's pc that records information and emails it to him, so she's worried that he might have that on her pc as well. She doesn't know what it was, or what it was called. I know that most keyloggers with email capability have the ability to hide from normal detection, so I was wondering if anybody had any suggestions on where to look for this. I've thought about maybe installing zonealarm and seeing when/if something is trying to email information to him, etc. I also seem to remember seeing a program on the net that would show all programs loaded/running on a system, including items like Magic Folders. I can't find that one again, but thought maybe somebody on here might have heard/seen it, or have any other suggestions on tracking this down. I've thought of just blowing the box away and reloading, but he took all of the software that they had when he moved and they aren't exactly getting along so well that he'd let her have it all to reload. Any suggestions would be helpful. Thanks. |
#3
|
|||
|
|||
Keylogger Question
From: "Johnnycat"
| A friend of our family has recently gotten a divorce, and her husband had | some computer know how. He left a computer for her to use, but increasingly | she is becoming worried that perhaps a keylogger or other some such software | has been left behind as a present because periodically he says things that | she doesn't think he should even know about. She knows that he installed | something on their daughter's pc that records information and emails it to | him, so she's worried that he might have that on her pc as well. She doesn't | know what it was, or what it was called. I know that most keyloggers with | email capability have the ability to hide from normal detection, so I was | wondering if anybody had any suggestions on where to look for this. I've | thought about maybe installing zonealarm and seeing when/if something is | trying to email information to him, etc. I also seem to remember seeing a | program on the net that would show all programs loaded/running on a system, | including items like Magic Folders. I can't find that one again, but thought | maybe somebody on here might have heard/seen it, or have any other | suggestions on tracking this down. I've thought of just blowing the box away | and reloading, but he took all of the software that they had when he moved | and they aren't exactly getting along so well that he'd let her have it all | to reload. Any suggestions would be helpful. Thanks. Keyloggers are Trojans and there are anti virus News Groups specifically for this type of discussion. microsoft.public.security.virus alt.comp.virus alt.comp.anti-virus The following Multi AV Scanning Tool can detects 100's of Keylogging Trojans using the scanners from four different AV vendors. Download MULTI_AV.EXE from the URL -- http://www.ik-cs.com/programs/virtools/Multi_AV.exe To use this utility, perform the following... Execute; Multi_AV.exe { Note: You must use the default folder C:\AV-CLS } Choose; Unzip Choose; Close Execute; C:\AV-CLS\StartMenu.BAT { or Double-click on 'Start Menu' in C:\AV-CLS } NOTE: You may have to disable your software FireWall or allow WGET.EXE to go through your FireWall to allow it to download the needed AV vendor related files. C:\AV-CLS\StartMenu.BAT -- { or Double-click on 'Start Menu' in C:\AV-CLS} This will bring up the initial menu of choices and should be executed in Normal Mode. This way all the components can be downloaded from each AV vendor's web site. The choices are; Sophos, Trend, McAfee, Kaspersky, Exit this menu and Reboot the PC. You can choose to go to each menu item and just download the needed files or you can download the files and perform a scan in Normal Mode. Once you have downloaded the files needed for each scanner you want to use, you should reboot the PC into Safe Mode [F8 key during boot] and re-run the menu again and choose which scanner you want to run in Safe Mode. It is suggested to run the scanners in both Safe Mode and Normal Mode. When the menu is displayed hitting 'H' or 'h' will bring up a more comprehensive PDF help file. http://www.ik-cs.com/multi-av.htm Additional Instructions: http://pcdid.com/Multi_AV.htm * * * Please report back your results * * * -- Dave http://www.claymania.com/removal-trojan-adware.html http://www.ik-cs.com/got-a-virus.htm |
#4
|
|||
|
|||
Keylogger Question
IMHO in such case the computer must have the operating system installed with
a pristine install of the operating system to a formatted hard drive. There are just too many things that could be compromised on that computer of which no scan program may detect and it seems to be used in a situation where one wants to insure privacy. Since all the software is missing it may be best to buy a new cheap computer. Today's cheapest computers are more powerful than the fastest personal computers of a couple years ago so there is no need in 90 percent of cases to get anything better. Any new install or new computer needs to have the Windows Firewall enabled, and strong passwords assigned to all user accounts including and especially the built in administrator account before any network cable is plugged into it. Steve "Johnnycat" wrote in message ... A friend of our family has recently gotten a divorce, and her husband had some computer know how. He left a computer for her to use, but increasingly she is becoming worried that perhaps a keylogger or other some such software has been left behind as a present because periodically he says things that she doesn't think he should even know about. She knows that he installed something on their daughter's pc that records information and emails it to him, so she's worried that he might have that on her pc as well. She doesn't know what it was, or what it was called. I know that most keyloggers with email capability have the ability to hide from normal detection, so I was wondering if anybody had any suggestions on where to look for this. I've thought about maybe installing zonealarm and seeing when/if something is trying to email information to him, etc. I also seem to remember seeing a program on the net that would show all programs loaded/running on a system, including items like Magic Folders. I can't find that one again, but thought maybe somebody on here might have heard/seen it, or have any other suggestions on tracking this down. I've thought of just blowing the box away and reloading, but he took all of the software that they had when he moved and they aren't exactly getting along so well that he'd let her have it all to reload. Any suggestions would be helpful. Thanks. |
#5
|
|||
|
|||
Keylogger Question
Logging other people's keystroke or breaking into other people's computer without their knowledge can be considered as an illegal
activity by many American courts. Carey Frisch Microsoft MVP Windows - Shell/User Enjoy all the benefits of genuine Microsoft softwa http://www.microsoft.com/genuine/default.mspx ---------------------------------------------------------------------------Â*--------------------------------- "Johnnycat" wrote in message ... |A friend of our family has recently gotten a divorce, and her husband had | some computer know how. He left a computer for her to use, but increasingly | she is becoming worried that perhaps a keylogger or other some such software | has been left behind as a present because periodically he says things that | she doesn't think he should even know about. She knows that he installed | something on their daughter's pc that records information and emails it to | him, so she's worried that he might have that on her pc as well. She doesn't | know what it was, or what it was called. I know that most keyloggers with | email capability have the ability to hide from normal detection, so I was | wondering if anybody had any suggestions on where to look for this. I've | thought about maybe installing zonealarm and seeing when/if something is | trying to email information to him, etc. I also seem to remember seeing a | program on the net that would show all programs loaded/running on a system, | including items like Magic Folders. I can't find that one again, but thought | maybe somebody on here might have heard/seen it, or have any other | suggestions on tracking this down. I've thought of just blowing the box away | and reloading, but he took all of the software that they had when he moved | and they aren't exactly getting along so well that he'd let her have it all | to reload. Any suggestions would be helpful. Thanks. |
#6
|
|||
|
|||
Keylogger Question
"Carey Frisch [MVP]" wrote in
message Logging other people's keystroke or breaking into other people's computer without their knowledge can be considered as an illegal activity by many American courts. As if the criminals care about that..! Ivor A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? A: Top-posting. Q: What is the most annoying thing on Usenet and in e-mail? |
#7
|
|||
|
|||
Keylogger Question
"Johnnycat" wrote in message
... A friend of our family has recently gotten a divorce, and her husband had some computer know how. He left a computer for her to use, but increasingly she is becoming worried that perhaps a keylogger or other some such software has been left behind as a present because periodically he says things that she doesn't think he should even know about. She knows that he installed something on their daughter's pc that records information and emails it to him, so she's worried that he might have that on her pc as well. She doesn't know what it was, or what it was called. I know that most keyloggers with email capability have the ability to hide from normal detection, so I was wondering if anybody had any suggestions on where to look for this. I've thought about maybe installing zonealarm and seeing when/if something is trying to email information to him, etc. I also seem to remember seeing a program on the net that would show all programs loaded/running on a system, including items like Magic Folders. I can't find that one again, but thought maybe somebody on here might have heard/seen it, or have any other suggestions on tracking this down. I've thought of just blowing the box away and reloading, but he took all of the software that they had when he moved and they aren't exactly getting along so well that he'd let her have it all to reload. Any suggestions would be helpful. Thanks. I am surprised your friend keep using the computer despite the fear that keylogger may be installed. My suggestions: (1) replace the hard disk and re-install the OS and other software on the new hard disk. Copy over any data from the old drive (data only, not programs). This is cheaper than buying a new PC but has the same level of security. This serves two purposes: by installing a new OS on a new drive, there is no possibility of any malware. Plus, the old drive is preserved so that you can analyze it for keylogger or what not and use it as evidence. If she doesn't want to bother with re-installing, then buy a new PC. Do not throw or give the old PC away. Either keep the old hard disk as potential evidence, or erase it totally, not just formatting it. (2) change all passwords on all email accounts, bank accounts, credit card accounts, etc. Perhaps the ex has her email password. If getting back the old software is an issue, ... post the question in a divorce court newsgroup. |
#8
|
|||
|
|||
Keylogger Question
"David H. Lipman" wrote: Keyloggers are Trojans and there are anti virus News Groups specifically for this type of discussion. FYI - not all keyloggers are Trojans. They can be legitimate programs installed with the owners knowledge and consent. A keylogger can also be a piece of hardware placed between the keyboard plug and the port on the PC. |
#9
|
|||
|
|||
Keylogger Question
"Carey Frisch [MVP]" wrote: Logging other people's keystroke or breaking into other people's computer without their knowledge can be considered as an illegal activity by many American courts. Carey Frisch Microsoft MVP Windows - Shell/User Couple of things: 1. Are you an attorney? 2. Since her ex left her the computer to use, there are numerous situations that one can imagine where the keylogging program (if it's actually there) is legitimate and might stand up in court. For example, he (as the actual owner of the PC) may have installed it prior to their separation. I don't know if I'd want to go chasing this particular wild goose. |
#10
|
|||
|
|||
Keylogger Question
The legality or illegality of using monitoring (and spyware and key logger)
programs depends on the legislation of each particular country (or administrative unit, i.e. state, autonomous republic, etc.) and also on following the rules of using these programs prescribed by the law. -- Carey Frisch Microsoft MVP Windows - Shell/User Enjoy all the benefits of genuine Microsoft softwa http://www.microsoft.com/genuine/default.mspx ---------------------------------------------------------------------------*--------------------------------- "null2006" wrote in message ... | | | "Carey Frisch [MVP]" wrote: | | Logging other people's keystroke or breaking into other people's computer without their knowledge can be considered as an illegal | activity by many American courts. | | Carey Frisch | Microsoft MVP | Windows - Shell/User | | Couple of things: | | 1. Are you an attorney? | | 2. Since her ex left her the computer to use, there are numerous situations that one can imagine where the keylogging program (if | it's actually there) is legitimate and might stand up in court. For example, he (as the actual owner of the PC) may have installed it | prior to their separation. I don't know if I'd want to go chasing this particular wild goose. | | | |
#11
|
|||
|
|||
Keylogger Question
"Carey Frisch [MVP]" wrote: The legality or illegality of using monitoring (and spyware and key logger) programs depends on the legislation of each particular country (or administrative unit, i.e. state, autonomous republic, etc.) and also on following the rules of using these programs prescribed by the law. So, you ARE dispensing legal advice?! I would suggest sticking to your area of expertise, and let the lawyers fight this one. |
#12
|
|||
|
|||
Keylogger Question
From: "null2006"
| | "David H. Lipman" wrote: | Keyloggers are Trojans and there are anti virus News Groups specifically for this type of discussion. | | FYI - not all keyloggers are Trojans. They can be legitimate programs installed with the | owners knowledge and consent. A keylogger can also be a piece of hardware placed between | the keyboard plug and the port on the PC. NONE are legitimate in the eyes of anti malware personnel -- NONE ! -- Dave http://www.claymania.com/removal-trojan-adware.html http://www.ik-cs.com/got-a-virus.htm |
#13
|
|||
|
|||
Keylogger Question
From: "null2006"
| | "Carey Frisch [MVP]" wrote: | The legality or illegality of using monitoring (and spyware and key logger) programs depends on the legislation of each particular country (or administrative unit, i.e. state, autonomous republic, etc.) and also on following the rules of using these programs prescribed by the law. | | So, you ARE dispensing legal advice?! | | I would suggest sticking to your area of expertise, and let the lawyers fight this one. Carey is correct ! The ONLY legal situation is an employer who puts this software on THEIR OWN equipment. That is not the case here and in fact there is already legal precedence. -- Dave http://www.claymania.com/removal-trojan-adware.html http://www.ik-cs.com/got-a-virus.htm |
#14
|
|||
|
|||
Keylogger Question
What about parents spying on their children?
-- Hope this helps. Let us know. Wes MS-MVP Windows Shell/User In , David H. Lipman hunted and pecked: From: "null2006" "Carey Frisch [MVP]" wrote: The legality or illegality of using monitoring (and spyware and key logger) programs depends on the legislation of each particular country (or administrative unit, i.e. state, autonomous republic, etc.) and also on following the rules of using these programs prescribed by the law. So, you ARE dispensing legal advice?! I would suggest sticking to your area of expertise, and let the lawyers fight this one. Carey is correct ! The ONLY legal situation is an employer who puts this software on THEIR OWN equipment. That is not the case here and in fact there is already legal precedence. -- Dave http://www.claymania.com/removal-trojan-adware.html http://www.ik-cs.com/got-a-virus.htm |
#15
|
|||
|
|||
Keylogger Question
From: "Wesley Vogel"
| What about parents spying on their children? | OK that's most likely legal also but... I think its unethical and the wrong approach. -- Dave http://www.claymania.com/removal-trojan-adware.html http://www.ik-cs.com/got-a-virus.htm |
|
Thread Tools | |
Display Modes | |
|
|