Keyloggers

#1
I have just installed webwatcher on my kids computers to monitor their use. My wife was very interested in the particular feature that hides the keylogging from the user and in fact there is no trace of the program on my kids' computer. I watch my laptop like a hawk but I can't be certain that wifey never had access to it. Does anyone know of a program that snifs out surveillance software such as webwatcher?
 
#3
Use a PDA to browse the web. It's easier to hide. Someone could write software to be 90% accurate at detecting spyware, but the next day some kid in Romania will write a new package that will not be detected. Okay, so you can look at standard trojan detection kits like spybot and crap cleaner. Once a machine is physically compromised, then all bets are off.
 
#8
cool thanks. At the risk of showing my ignorance: what's a hardware logger?
You plug it in between the keyboard and the PC. It goes to work recording everything that is typed. A secret key combination causes it to replay everything that was typed since it was last replayed. Great fun sneaking it into libraries and coming back later to retrieve what was recorded. There are also methods to record what you type based on power being drawn by the machine. Believe it or not, signals within the machine can be read in fluctuations in the power supply and by emitted radio frequencies.

http://www.brickhousesecurity.com/home-keystrokelogger-keyphantomusbhome.html
http://tinyurl.com/adv-hwhacking
http://en.wikipedia.org/wiki/TEMPEST
 
#9
You might want to try a live cd system.
Boot up from the cd, nothing stored on the HD.
Won't defeat a hardware logger, but completely overrides the software kind.

http://www.livecdlist.com/

Slax (http://www.slax.org/) worked great for me when I used it.

You can even run some of them from a USB key.
The problem with "Live CD" operating systems is that after you turn off your computer, all the up grades, down loads, new software you down loaded to your computer will be lost. A better idea might be to try Ubuntu Linux. This distro gives you the option to install it inside of Windows and automatically installs a dual boot manager. Remember, this is linux malware like key loggers won't hurt you, and as this linux is install on your hard drive, any changes to your installation, software upgrades, additional software, etc. will remain on your computer when you reboot. If this Linux distro won't do every thing windows does (and none of them do), you can always reboot back into windows.
 
#10
The question really becomes: how much work do you want to put into this? I say you buy a PDA and hide it. Set your browser to delete all cookies and use a dedicated gmail account (but don't save the login or pssword in the PDA).
 
#11
Elmo, Linux is not immune to keyloggers...especially the hardware kind....

As for the Live CD not being upgradeable or permanent, well, that is kind of the point. Just use it for your monger browsing and then turn off the computer. The CD you put in is exactly the same as the CD you take out...no changes can be written to a typical CD. No chance of cookies, history, etc. being stored on the local HD.
 
#12
Elmo, Linux is not immune to keyloggers...especially the hardware kind....

As for the Live CD not being upgradeable or permanent, well, that is kind of the point. Just use it for your monger browsing and then turn off the computer. The CD you put in is exactly the same as the CD you take out...no changes can be written to a typical CD. No chance of cookies, history, etc. being stored on the local HD.
Who do you think would try to install a keylogger on your computer, some hacker some where on the internet trying to steal your identity, credit card number, etc. or you wife trying to discover your hobby? While Linux is not immune to malware, there just doesn't seem to be any that can effect linux, so few people actually use linux in relation to the number of window's users (and Mac users) that writers of malware just don't seem to want to bother.

In addition, Linux users are some how seen to be the good guys, so hackers leave them alone. Linux has far more secure user names and passwords then Windows has, so the chance that your wife is going to log on to your linux system is remote.

I would know immediately if some one installed a hardware keylogger on my computer. Just how (and why) would some anonymous hacker break into my apartment and install a hardware keylogger on my computer.
 
Top