How to detect the keylogger softwares which are running in the system. Keylogger run in hidden mode,by the processes running in the background are us to detect it. Is there any process/me3thod to get complete details of process i.e, how muchmemory,cpu,harddisk spae are using and which files in drive are using.

Member Avatar
Member Avatar
+0 forum 4

As with any online service that starts to get popular traction and experiences rapid growth, social network come micro-blog platform Tumblr has been the target of just about every kind of scam and attempted cyber-criminal subversion out there [inclduing some of its own making](http://www.daniweb.com/internet-marketing/social-media-and-communities/news/459258/tumblr-warns-users-to-change-password-after-security-mess). Most of the time it's not worth reporting on these as they fall into the 'same old, same old' category, and if we did then DaniWeb would be so awash with scam warnings that every other posting would be drowned into obscurity. However, this one is worthy of our attention. Not least as it seems to …

Member Avatar
Member Avatar
+0 forum 4

so heres the code import pyHook, pythoncom, sys, logging file_log = 'C:\\LogFile\\log.txt' some other non important stuff here so the issue is that everytime i try to run the program it says that pyHook is not a module. I have downloaded it for my system but it still doesnt work, I have also downloaded pyWin. the error says Importerror: No module named pyHook But I installed it correctly from this website http://www.lfd.uci.edu/~gohlke/pythonlibs/#pyhook and installed pyHook‑1.5.1.win‑amd64‑py3.3.exe I have win 8 64bit using py3.3 and have an amd processor but it wont work. If anyone knows how to fix this I would …

Member Avatar
Member Avatar
+0 forum 1

My computer has been severely hacked. Well 2 laptops actually. And it looks like my router also. Problems noted here: 1. Email accounts routinely hacked even after changing passwords and using keypass in the securist way. Suspected keyloggin occuring somewhere in the stream. 2. Something causing my typing to be highlighted and changed into other words and characters, not randomly but as in remote access type of thing. Suspected rootkit worm virus (I'm only above novice in this stuff). 3. Internet modifications occuring where webpages are rendered with intelligent inaccuracies, suspected DNS redirection and spoofing. If not virus worm etc. …

Member Avatar
Member Avatar
+0 forum 3

Hi DW peps. I've used the following codes to crypt and save files now I want to decrypt it when I'm reading it so that let say I want to check if the saved password matchs the entered password which the saved password is saved on pc drive e.g. Drive D:\. I wont put all of my code but will put the code I used to crypt and save the crypted text in a file. ' ontop you need to import these files. Imports System Imports System.Security.Cryptography Imports System.Collections Imports System.Text Private sub BtnRegist_Click() Dim name As String name = …

Member Avatar
Member Avatar
+0 forum 1

hey all! i created a keylogger of my own in visual c++ 2010, and included iostream, windows.h winUser.h the problem m facing is that it runs only when visual c++ is open. as soon as i try to close it, it pops a message to stop debugging and if i go with it, keylogger stops. can anybody help me how to keep my keylogger in running position as soon as my laptop starts? i know it is very wrong to make this kind of software.. but m taking it as a fun only! not to stealing any property! Thanks guys.. …

Member Avatar
Member Avatar
+0 forum 6

First off, I am new to this forum so please forgive me for any traditions that you all usually keep that I haven't kept. Currently, I am a java programmer, but I am recently trying to learn scheme for a project. In terms of java swing, can someone explain to be how everything gui is connected in scheme/racket. Things which i am looking for in explainations: Panels (ex. Color, position, size) Frames Windows vs Frames Canvas Key-events (how manage what these events will do when activated) (keyboard) Images/Bitmap importation Maybe a simple program, if one of you guys have time, …

Member Avatar
Member Avatar
+0 forum 4

Hello. I´m trying to program a windows interactive-service general purpose keylogger. In the code I´m trying to use GetAsyncKeyState(int ) function to know if a key was pressed, but I know a Windows Service runs in a different desktop than the active user, so the function fails. Does someone know how the service can communicate with the active user's desktop in order to log the keys? Thanks in advance.

Member Avatar
+0 forum 0

I am working with a keyloger procedure to capture user inputs even mouse has no focus on my app windows. I make it work using that code, the problem is that [CODE] event = handle.read(6)[/CODE] only reports clicks when buffer is full. Its not working ok because there is a lot of missing clicks. Whats the way to turn this into a real event handler procedure? Thank you. [CODE]#!/usr/bin/env python from threading import Thread CLICK_LEFT = ('%c%c%c%c%c%c')%(0x9,0x0,0x0,0x8,0x0,0x0) CLICK_RIGHT = ('%c%c%c%c%c%c')%(0xA,0x0,0x0,0x8,0x0,0x0) CLICK_MED = ('%c%c%c%c%c%c')%(0xC,0x0,0x0,0x8,0x0,0x0) try: handle = open("/dev/input/mouse1", 'rb') except Exception, e: print "Error 0:", e ACTIONS = {'L':0,'M':1,'R':2} def mouseClicks(): …

Member Avatar
Member Avatar
+0 forum 2

[URL="http://en.wikipedia.org/wiki/Nicodemo_Scarfo,_Jr."]Nicodemo Scarfo Jr[/URL], a well-connected member of the [B]New York[/B] and [B]Philadelphia[/B] organised crime families, knows all about keylogging. But rather than using the technique to steal or launder money, he was brought down by the [B]Magic Lantern[/B] [URL="http://en.wikipedia.org/wiki/Keylogger"]keylogger[/URL] that the FBI installed on his computer via a Trojan. It might not be the typical bullets and bloodshed picture of gangland America, but it was enough to indict him for running an illegal gambling ring and loan sharking. [URL="http://en.wikipedia.org/wiki/Magic_lantern"]The Magic Lantern[/URL] recorded every keystroke made and sent the information to the Feds - who were then able to piece together …

Member Avatar
Member Avatar
+0 forum 1

The End.