Why are you running a keylogger?
No, it doesn't make any difference what you do the keystrokes with. If you have a keylogger you should NOT under any circumstances enter any information you care about. |
Originally Posted by Crazy9000 ![]() No, it doesn't make any difference what you do the keystrokes with. If you have a keylogger you should NOT under any circumstances enter any information you care about. |
Originally Posted by tubers ![]() Well that is one thing, I am really scared that there are even weird-a$$ keylogger that are almost impossible to detect with common anti virus or malware checks.. HelP ![]() |
Originally Posted by TheGrayNobleman ![]() This If you wanna stick with windows here are my suggestions. Get a good firewall like Comodo. Get an excellent anti-virus like Avira, and install Malware Bytes and Spybot. Run regular updates/scans. (check out my sig for more info) There are also anti-keylogger pieces of software out there which encrypt keystrokes. If you are REALLY paranoid. Delete windows, encrypt your hard drive, reinstall windows and install all the software above. Unless you've pissed a hacker off or pirate a lot of software I wouldn't be too worried. If there are any suspicious files you wanna check upload it to www.virustotal.com which will scan it with ~120 anti-virus programs. Even if it is hard to detect a couple of em will report a suspicious file. Enjoy and PM me if you have any other questions. |
Originally Posted by tubers ![]() No Linux for me anytime soon. And why no keyloggers for Linux? Is it because it is a minority OS that not much would target it for malwares? |
Originally Posted by error10 ![]() From MSDN, where else? No, it's because Linux is an extremely hostile environment for malware. Getting a piece of malware to actually WORK is just this side of impossible, since there are so many different layers of security that would have to be bypassed, and the chance of finding a hole in all of them at the same time is virtually zero. About the only way to get a piece of malicious software onto a Linux system is to install it intentionally, and then run it as root, intentionally again. Someone doing both is extremely unlikely, even if they are a total noob. And even then, I wouldn't count on it doing much damage or spreading very far. |