Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Finding key loggers - how difficult is it for them to hide?

Posted on 2013-11-06
3
Medium Priority
?
291 Views
Last Modified: 2013-11-21
Will mbam and super anti spy find them?
0
Comment
Question by:fcek
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
Timothy McCartney earned 2000 total points
ID: 39628711
They're a good start. You should look into HijackThis as well.
http://www.bleepingcomputer.com/download/hijackthis/

The guys at bleeping computer are more than helpful with analyzing the HT log files too and can help you get your machine cleaned up.
0
 

Author Comment

by:fcek
ID: 39628856
God its been so long since I used www.hijackthis.de 

I get an error re write access to the hosts file in Win 7 though .

Ive one poss pest...
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local;
0
 
LVL 9

Assisted Solution

by:Timothy McCartney
Timothy McCartney earned 2000 total points
ID: 39628974
I actually came upon this thread recently:

http://www.wilderssecurity.com/showthread.php?t=249469

It's a massive list of free security tools available for download, each labeled into categories based on what type of tool they are (ie: malware scanners, rootkit scanners, etc).

There's also an anti-keylogger section with a couple of links, one pointing to:
http://www.snoopfree.com/
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

By the time you finish reading this article, you may have already lost all your money because you don't know the simple steps to securing your BitCoin wallet. BitCoin is an incredible invention. It is a decentralized currency system, which is the…
If you are looking at this article, you have most likely been hit by some version of ransomware and are trying to find out if there is anything you can do, or what way you should react - READ ON!
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question