Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Interested in information on obtaining a trustworthy Keylogger.

Posted on 2006-11-02
8
Medium Priority
?
393 Views
Last Modified: 2013-12-04
Hello all, i've recently become interested in obtaining more information on keyloggers. Any advice on where i might find some trustworthy info on them? Quite honestly, i have a 13 year old daughter who is beginning to become a little too wild. She lives out of my area with her mom, i only see her one weekend a month. Mom does'nt care much about our daughters change, but i do. I would like to capture her email and myspace password the next time she comes to visit me, and uses my computer. I know this seems somewhat extreme, but believe me, this is a last resort.
0
Comment
Question by:MisfitDevil99
  • 4
  • 2
7 Comments
 
LVL 25

Expert Comment

by:mikeleebrla
ID: 17859371
if you are using this to capture usernames and passwords for PRIVATE email address then that is considered hacking and against the member agreement of Experts-Exchange.
0
 

Author Comment

by:MisfitDevil99
ID: 17863210
Understood. As i stated, this was purely a last resort, out of sheer desperation. I apologize.
0
 

Author Comment

by:MisfitDevil99
ID: 17863386
Would it still be inappropriate to ask if this is a known and trusted site? Or are all of these such sites dangerous?
0
Automating Your MSP Business

The road to profitability.
Delivering superior services is key to ensuring customer satisfaction and the consequent long-term relationships that enable MSPs to lock in predictable, recurring revenue. What's the best way to deliver superior service? One word: automation.

 
LVL 38

Accepted Solution

by:
Rich Rumble earned 2000 total points
ID: 17863900
There are apps Spector Pro that are respectable, but it comes down to communication and trust ultimately. Easier said than done... I know, just don't give up. It's your PC, and you can install what you wish. Just as an FYI, myspace get's hacked on a pretty regular basis, and phishers and scammers manipulate the site to install apps on your machine. I'd make sure your daughters account is in the "users group" not the administrators group.
http://nonadmin.editme.com/WhyNonAdmin http://xinn.org/win_bestpractices.html
MySpace compromise: http://news.netcraft.com/archives/2006/10/27/myspace_accounts_compromised_by_phishers.html (oct 2006)
http://www.theregister.co.uk/2006/06/05/myspace_phishing_attack/ (june 2006)
http://blog.washingtonpost.com/securityfix/2006/07/myspace_ad_served_adware_to_mo.html (july 2006)
..etc...
-rich
0
 

Author Comment

by:MisfitDevil99
ID: 17864526
Wow rich! Thanks for the info, as well as the food for thought. I tried creating a user account, transfered all my pics and docs to a shared folder, but when i tried to view them the docs opened as read only...? Still playing with it though.

As for the keylogger, YES... it is my computer i intended to use it on, AND my daughter is a minor (13 years old). I hardly see her, so my imput is limited to one weekend a month. As i said, i've tried everything else... this was a last resort.

Without encouraging me at all, is it innapropriate to tell me if you know if this site and device they sell is reliable? Dangerous?

Anyhoot, thanks for the understanding at least rich.

Misfit.
0
 

Author Comment

by:MisfitDevil99
ID: 17864535
0
 
LVL 38

Expert Comment

by:Rich Rumble
ID: 17865348
yes I remember from the last question. HW keyloggers are ok but detectable easily by site.
-rich
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…

824 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question