Solved

Finding key loggers - how difficult is it for them to hide?

Posted on 2013-11-06
3
275 Views
Last Modified: 2013-11-21
Will mbam and super anti spy find them?
0
Comment
Question by:fcek
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
Timothy McCartney earned 500 total points
ID: 39628711
They're a good start. You should look into HijackThis as well.
http://www.bleepingcomputer.com/download/hijackthis/

The guys at bleeping computer are more than helpful with analyzing the HT log files too and can help you get your machine cleaned up.
0
 

Author Comment

by:fcek
ID: 39628856
God its been so long since I used www.hijackthis.de 

I get an error re write access to the hosts file in Win 7 though .

Ive one poss pest...
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local;
0
 
LVL 9

Assisted Solution

by:Timothy McCartney
Timothy McCartney earned 500 total points
ID: 39628974
I actually came upon this thread recently:

http://www.wilderssecurity.com/showthread.php?t=249469

It's a massive list of free security tools available for download, each labeled into categories based on what type of tool they are (ie: malware scanners, rootkit scanners, etc).

There's also an anti-keylogger section with a couple of links, one pointing to:
http://www.snoopfree.com/
0

Featured Post

Free Tool: Postgres Monitoring System

A PHP and Perl based system to collect and display usage statistics from PostgreSQL databases.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Russian pop up ad virus 8 152
Microsoft scam computer 10 78
Kaspersky Antivirus reports 4 73
obsev.719 virus in win 7 pc 9 60
Most PC repair technicians (if not all) always start their cleanup process by emptying the temp folders before running any removal tools. It makes sense because temp folders are common places for malware installers to lurk and removing all the junk …
HOW TO REMOTELY CLEAN MEROND.O WITH ESET SILENTLY PROBLEM       If you have the fortunate luck to contract the Merond.O virus on your network, it can be quite troublesome to remove as it propagates to network shares on your network. In my case, the …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question