?
Solved

Finding key loggers - how difficult is it for them to hide?

Posted on 2013-11-06
3
Medium Priority
?
299 Views
Last Modified: 2013-11-21
Will mbam and super anti spy find them?
0
Comment
Question by:fcek
  • 2
3 Comments
 
LVL 9

Accepted Solution

by:
Timothy McCartney earned 2000 total points
ID: 39628711
They're a good start. You should look into HijackThis as well.
http://www.bleepingcomputer.com/download/hijackthis/

The guys at bleeping computer are more than helpful with analyzing the HT log files too and can help you get your machine cleaned up.
0
 

Author Comment

by:fcek
ID: 39628856
God its been so long since I used www.hijackthis.de 

I get an error re write access to the hosts file in Win 7 though .

Ive one poss pest...
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local;
0
 
LVL 9

Assisted Solution

by:Timothy McCartney
Timothy McCartney earned 2000 total points
ID: 39628974
I actually came upon this thread recently:

http://www.wilderssecurity.com/showthread.php?t=249469

It's a massive list of free security tools available for download, each labeled into categories based on what type of tool they are (ie: malware scanners, rootkit scanners, etc).

There's also an anti-keylogger section with a couple of links, one pointing to:
http://www.snoopfree.com/
0

Featured Post

SMB Security Just Got a Layer Stronger

WatchGuard acquires Percipient Networks to extend protection to the DNS layer, further increasing the value of Total Security Suite.  Learn more about what this means for you and how you can improve your security with WatchGuard today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
IF you are either unfamiliar with rootkits, or want to know more about them, read on ....
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

601 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question