Welcome to ECCIE, become a part of the fastest growing adult community. Take a minute & sign up!

Welcome to ECCIE - Sign up today!

Become a part of one of the fastest growing adult communities online. We have something for you, whether you’re a male member seeking out new friends or a new lady on the scene looking to take advantage of our many opportunities to network, make new friends, or connect with people. Join today & take part in lively discussions, take advantage of all the great features that attract hundreds of new daily members!

Go Premium

Go Back   ECCIE Worldwide > General Interest > Security Matters
test
Security Matters Personal security is of the utmost priority. Discussions regarding every aspect of personal security within the hobby can be found here.

Most Favorited Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Most Liked Images
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
  • Thumb
Top Reviewers
cockalatte 649
MoneyManMatt 490
Still Looking 399
samcruz 399
Jon Bon 398
Harley Diablo 377
honest_abe 362
DFW_Ladies_Man 313
Chung Tran 288
lupegarland 287
nicemusic 285
Starscream66 281
You&Me 281
George Spelvin 270
sharkman29 256
Top Posters
DallasRain70818
biomed163587
Yssup Rider61195
gman4453322
LexusLover51038
offshoredrilling48784
WTF48267
pyramider46370
bambino43117
The_Waco_Kid37362
CryptKicker37228
Mokoa36497
Chung Tran36100
Still Looking35944
Mojojo33117

Reply
 
Thread Tools
Old 05-02-2010, 07:34 AM   #1
urhuckleberry
Ambassador
 
Join Date: Jan 1, 2010
Location: La Costa Rica
Posts: 8,511
Encounters: 42
Default Big brother snooping software - how to detect?

OK, if you have a suspicious SO who you think might be doing some undercover on your computer... recording keystrokes or something similar...is there software to detect that software... "spy vs. spy" crap?

H
urhuckleberry is offline   Quote
Old 05-02-2010, 07:43 AM   #2
rakuguy
Ambassador
 
rakuguy's Avatar
 
Join Date: Dec 31, 2009
Location: an undisclosed one
Posts: 1,787
Encounters: 2
Default

How to detect a Keylogger
  • Check the task list by press ctrl+alt+del in windows. Examine all the tasks running, if you unsure of a task look it up on a search engine.
  • Use the system configuration utility to determine which task are loaded at start-up (type "msconfig" in the run box to start).
  • Run your antivirus checker, it's possible this will pick up the Keylogger on your system.
  • Scan your hard disk for the most recent files stored. Look at the contents of any files continually updating (these might be logs).
  • Download a specific keylogger detector program, and see if it detects anything. Do a search for keylogger detection, anti keylogger, anti spyware programs.
  • Run Spybot S&D, this program checks for some known keyloggers
rakuguy is offline   Quote
Old 05-02-2010, 10:20 AM   #3
urhuckleberry
Ambassador
 
Join Date: Jan 1, 2010
Location: La Costa Rica
Posts: 8,511
Encounters: 42
Default

THANKS, Rakuguy!

H
urhuckleberry is offline   Quote
Old 05-02-2010, 02:02 PM   #4
CyberProf
Gaining Momentum
 
CyberProf's Avatar
 
Join Date: Feb 2, 2010
Location: Republic of Texas
Posts: 69
Encounters: 7
Default

Take note: there are lots of keyloggers and other programs that will not be detected - so, that being said, if you are truly paranoid - use deep freeze on your machine after you have verified a clean install. And only surf in a VM environment after an external media boot (i.e. usb that you keep on you). Basically, never use software on the machine, and never leave anything behind.

Yes, a lot of work to set up, but in the end it may pay off - only you can judge your risk and your tolerance for it.
CyberProf is offline   Quote
Old 05-02-2010, 03:06 PM   #5
JohnnyFarangly
Poke Her Face
 
JohnnyFarangly's Avatar
 
Join Date: Mar 29, 2009
Location: Houston
Posts: 504
Encounters: 2
Default

There are also hardware keyloggers that are installed in the keyboard cable.
http://www.amazon.com/KeyLlama-4MB-Value-Hardware-Keylogger/dp/B001DB938A
http://www.keyghost.com/

Some software keyloggers run as 'svchost.exe' or similar common name, and are thus not detectable in the Task Manager
JohnnyFarangly is offline   Quote
Old 05-02-2010, 03:09 PM   #6
GneissGuy
Thank God it's Firday!
 
GneissGuy's Avatar
 
Join Date: Dec 12, 2009
Location: Austin, TX
Posts: 2,698
Encounters: 12
Default

You can put knoppix on a DVD and only do your "bad" stuff from knoppix. It's a "live" linux distribution. You can't save any data, but it's pretty secure. It's not that hard to use linux. You get a web browser and you can use it just like your normal web browser under windows.

There are ways to put a hardware keylogger on your PC that doesn't even use software on your computer at all.

The spyware programs are designed to be hard to detect and eliminate. Because Intel and windows PC's are such horrible insecure pieces of crap, they can usually get away from it. In particular, the new TPM (Trusted Platform Module) that is beginning to be installed on some PC's makes it possible for someone to put something on your computer that is theoretically impossible to detect.

Get your own computer, don't let the SO use it at all. Get paranoid about her "screwing it up." Better to have a laptop with a startup password such that she can't even stick in a CD or thumb drive and boot the PC up with her own software.

By the way, even if she can't boot up your PC, she can remove the hard drive, put it into another computer, and install new software on your hard drive there. You can encrypt the data on the hard drive with software, but unless the hard drive has encryption hardware, she could put a cracked version of the encryption software on it.

And to top it off, if you're running Windows, or even Mac or linux, your OS is insecure and can be hacked over the network.

You can make it difficult, but it's really hard to make it impossible to be cracked. Any security measures you add simply reduces your chances of being cracked.
GneissGuy is offline   Quote
Old 05-05-2010, 03:06 PM   #7
Krunkman
Valued Poster
 
Join Date: Mar 28, 2010
Location: North Dallas
Posts: 808
Encounters: 4
Default

Use all of the above suggestions. Someone who goes and does a little bit of reseach and talking to the right spy guys will be able to defeat most system scanners. Hardware keyboard loggers that attach to the keyboard cable are easy to detect if you look for them. You'll see an extra 'adapter' plugged into the PC where the keyboard cable goes.

If you aren't sure, then get your own laptop and put encryption software on it, like PGP or any of the other packages, so that it requires a password to even boot up. Then even if your SO takes the computer to a specialist they first have to crack the encryption software before then can access it.

The bonus of it is that encyrption software is easily justifiable, since you don't want any "thieves" stealing your stuff.

But if you have to share a computer, I'd go with the self-booting linux idea and check for the hardware keyboard loggers. That would be the safest alternative to getting a separate system.

You could also just get a netbook pc for like $200, and go to any public free wi-fi site and surf for free. Netbooks are pretty small and easy to conceal.
Krunkman is offline   Quote
Old 05-09-2010, 08:32 PM   #8
simplegent
Valued Poster
 
simplegent's Avatar
 
Join Date: Jan 2, 2010
Location: USA
Posts: 1,402
Encounters: 16
Default

My general rule of thumb - NEVER EVER use the Hobby Tools at a site your SO might have access to. Just my own personal thought from past experiences. LOL
simplegent is offline   Quote
Old 05-11-2010, 12:51 AM   #9
Sir Lancelot
Lifetime Premium Access
 
Sir Lancelot's Avatar
 
Join Date: Mar 29, 2009
Location: Camelot
Posts: 1,389
Encounters: 5
Default

Nothing is absolutely perfect, but ...

1. Buy her a computer of her own as a gift on her Birthday, Mother's Day, Christmas, etc. Gifts don't seem too suspicious.
2. Create a Master Admin account on yours.
3. Allow only the Admin to install new programs (it's an option).
4. Create a separate logon account on your machine for normal use.

Then if you're still feeling paranoid:

5. Put a key logger on your machine.
6. Each time you get on check the key logger to see if anything suspicious has happened since your last use.


SL
Sir Lancelot is offline   Quote
Old 05-11-2010, 06:00 AM   #10
fiero bandit
Registered Member
 
Join Date: Apr 2, 2010
Location: dallas
Posts: 2
Default

Good things to know.Its scary if you really know how deep it can get.I used to be with my head in the sand til a friend had to hack into her brothers email.dam its so easy.thx for the information.Its very helpful.
fiero bandit is offline   Quote
Old 05-13-2010, 03:09 PM   #11
Guest110811-2
Account Disabled
 
Join Date: Jan 7, 2010
Location: ftw
Posts: 13
Default

https://www.ironkey.com/demo-personal
Guest110811-2 is offline   Quote
Old 08-11-2010, 11:24 AM   #12
Charlie Brown
Valued Poster
 
Charlie Brown's Avatar
 
Join Date: May 8, 2010
Location: Dallas
Posts: 1,628
Encounters: 72
Default

Scary..try typing these words or a similar phrase in your search engine:

blackberry eavesdropping
Charlie Brown is offline   Quote
Old 08-12-2010, 12:16 PM   #13
SneakyCancer
Valued Poster
 
Join Date: Oct 6, 2009
Location: Balls Deep
Posts: 3,482
Encounters: 43
Default

download a different browser. if she uses IE, then u use Mozilla or Safari or something. And make sure the browser dumps you history, cache, cookies, and passwords. and if you bookmark a site, always change the names to something stupid that wouldnt make them want to see what it is.
SneakyCancer is offline   Quote
Old 08-12-2010, 11:24 PM   #14
ManOnAMission
Valued Poster
 
Join Date: Jul 12, 2010
Location: Baton Rouge
Posts: 206
Encounters: 2
Default

use a linux disto on a usb with password and encryption
ManOnAMission is offline   Quote
Old 08-13-2010, 03:04 AM   #15
Smerc
Premium Access
 
Smerc's Avatar
 
Join Date: Aug 7, 2010
Location: Tulsa, Connecticut
Posts: 581
Default

I use ESET SS which includes a firewall and a AV that updates around 6+ times a day. Any firewall will work as long as it has a interactive mode, which means you select what you want to run. The drawback is that some items may look fishy in some way, but their actual needed by your system.

If you're on windows then there are a few remote desktop services that are able to run in the background. I would say you would never need these depending on your situation. You can knock a few out in your control panel>network sharing center. You can configure things from there just allowing no sharing or any access to your network. This may not work if she has a router which needs to detect PCs on the network, since sometimes ISPs change IPs after some redials.

The other users pointed out a lot of good information on programs to protect/detect. One that really comes to mind is HiJackThis. It's a free application which you can download from a freeware site. This can detect a lot of apps and registration files. If you do get it and scan your PC, you can save the log (completed list) or click analyzeThis which tells information about a select item. I wouldn't use the analyzeThis option though.

Some programs may be detected, but may not have any information about them. For that case I would join a PC forum, any PC forum basically and make a post showing your log file. Most of the users can pinPoint any files that look fishy, etc.

I use Firefox and it's not secure without addons. You may have ran into one of those, this site is blocked type scenarios. Well that's the only useful function it has, which is default. I can't comment on any other browser.

Firefox has a save password option which can be obtained through it's appdata folder I think. It my be encrypted though, but it wont stop anyone who wants your shit. The passwords are also visible through Tools:Options:Security:Save Passwords. For this type of thing, there is an addon called noscript and a useful one called AdBlockPro. It's a start, but wont save anyone from getting into that file. Their just for blocking flagged sites or scripts that may run in the background of a website (IE: iframes). You can resort to completely not allowing anything to be saved through firefox.


I basically do all the above and stay pretty clean. The only problem I ever encountered was due to Firefox, which I detected a flagged javascript file.

You can surf on a Virtual Windows Machine, but I would just get it right the first time. Not sure if security is a daily thing or you just need it for certain occasions, but the VM remark that cyber pointed out is a way to go. There is always the proxy option, but their slow and SOME proxies are actually supplied by certain IT companies within the government. I wont go into detail on that, but a lot of people get canned.

Another thing, if you download something from somewhere/someone. Scan the file with virustotal(dot)com. It scans with around 20 or so programs and may flag a fishy item. There is no bulkUpload option so if you're curious about multiple items then place them in a folder and zip/rar it (winzip/winrar, both freeware). The file can't be over 20mb I think. If you scan it that way and it pulls up a alert, then scan them one by one until you find the culprit. Some alerts may be "falseflag", do a google to learn more on that, it doesn't mean their bad.


Yeah it's probably confusing, but thought I would get that out there incase anyone was also browsing and wanted to know.


EDIT: Another thing on USBs. You shouldn't worry about them unless you use it as a constant memory source. Not sure how you can protect that aside from basic computer security. Except allowing an outside source to access the data from it. If you carry it around, you can password lock files with certain apps or you can use a software which autoboots a program on it to password protect it. USB Secure does that, along with what some users above mentioned.
Smerc is offline   Quote
Reply



AMPReviews.net
Find Ladies
Hot Women

Powered by vBulletin®
Copyright © 2009 - 2016, ECCIE Worldwide, All Rights Reserved