Solved

Finding key loggers - how difficult is it for them to hide?

Posted on 2013-11-06
3
270 Views
Last Modified: 2013-11-21
Will mbam and super anti spy find them?
0
Comment
Question by:fcek
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
Timothy McCartney earned 500 total points
ID: 39628711
They're a good start. You should look into HijackThis as well.
http://www.bleepingcomputer.com/download/hijackthis/

The guys at bleeping computer are more than helpful with analyzing the HT log files too and can help you get your machine cleaned up.
0
 

Author Comment

by:fcek
ID: 39628856
God its been so long since I used www.hijackthis.de 

I get an error re write access to the hosts file in Win 7 though .

Ive one poss pest...
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local;
0
 
LVL 9

Assisted Solution

by:Timothy McCartney
Timothy McCartney earned 500 total points
ID: 39628974
I actually came upon this thread recently:

http://www.wilderssecurity.com/showthread.php?t=249469

It's a massive list of free security tools available for download, each labeled into categories based on what type of tool they are (ie: malware scanners, rootkit scanners, etc).

There's also an anti-keylogger section with a couple of links, one pointing to:
http://www.snoopfree.com/
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

For those of you actively in the Malware fightling business, we now have available an amazing new tool in the malware wars (first recommended to me by rpggamergirl (http://www.experts-exchange.com/M_3598771.html), the Zone Advisor for the Virus and …
Ransomware continues to be a growing problem for both personal and business users alike and Antivirus companies are still struggling to find a reliable way to protect you from this dangerous threat.
This is used to tweak the memory usage for your computer, it is used for servers more so than workstations but just be careful editing registry settings as it may cause irreversible results. I hold no responsibility for anything you do to the regist…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now