Solved

Finding key loggers - how difficult is it for them to hide?

Posted on 2013-11-06
3
274 Views
Last Modified: 2013-11-21
Will mbam and super anti spy find them?
0
Comment
Question by:fcek
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
Timothy McCartney earned 500 total points
ID: 39628711
They're a good start. You should look into HijackThis as well.
http://www.bleepingcomputer.com/download/hijackthis/

The guys at bleeping computer are more than helpful with analyzing the HT log files too and can help you get your machine cleaned up.
0
 

Author Comment

by:fcek
ID: 39628856
God its been so long since I used www.hijackthis.de 

I get an error re write access to the hosts file in Win 7 though .

Ive one poss pest...
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local;
0
 
LVL 9

Assisted Solution

by:Timothy McCartney
Timothy McCartney earned 500 total points
ID: 39628974
I actually came upon this thread recently:

http://www.wilderssecurity.com/showthread.php?t=249469

It's a massive list of free security tools available for download, each labeled into categories based on what type of tool they are (ie: malware scanners, rootkit scanners, etc).

There's also an anti-keylogger section with a couple of links, one pointing to:
http://www.snoopfree.com/
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
I need to purchase BitCoins 4 112
Exchange Performance Query related to TLS upgrade 6 137
antispam / virus gateway 5 59
Antivirus - Webroot vs Symantec? 6 140
The intent of this Article is to provide the basic First Aid steps for working through most malware infections. The target audience includes experienced IT professionals and the casual user who just wants to make the infection go away. **********…
Malware seems to be getting smarter and smarter. If you are having trouble being able to launch your malware removal tools such as (and recommended): MalwareBytes, HiJackThis, ComboFix, etc. you can try some of the workarounds listed below. 1. Ma…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

832 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question