search for: keylogg

Displaying 20 results from an estimated 27 matches for "keylogg".

Did you mean: kellogg
2011 Oct 26
1
Re: Keylogger question
micdhack wrote: > My wow account was hacked and since i logged in more from ubuntu than windows i wanted to ask if it is possible a keylogger to be installed through wine and if it could start automatically to monitor the system each time linux starts or each time i start some wine application. > By the way i used antivirus to scan linux and wine directories and nothing was found In my experience, the keylogger is invisible, and it...
2011 Oct 18
1
Re: Keylogger question
A little old but common topic, but still want to share my opinion here. First of all, you need to detect and find out that if you really have a keylogger on your computer. There are several ways to detect a keylogger, from simply reviewing the processes running on the computer to use a mac os spy detection program. Step 1 Open the Activity Monitor to check for unknown process. This system tool will allow you to view the programs (processes) curr...
2011 Oct 27
0
Re: Keylogger question
Martin Gregorie wrote: > On Wed, 2011-10-26 at 02:38 -0500, isobella wrote: > > > In my experience, the keylogger (http://www.microkeylogger.com) is invisible, and it run with other > > applicatioons. What's more, most keyloggers are undetectable. While, I > > know a very simple way to detect it. Type CTRL + ALT + DELETE, it will > > open your Task Manager, Processes tab look for BKP. e...
2009 Jun 13
7
Keylogger question
My wow account was hacked and since i logged in more from ubuntu than windows i wanted to ask if it is possible a keylogger to be installed through wine and if it could start automatically to monitor the system each time linux starts or each time i start some wine application. By the way i used antivirus to scan linux and wine directories and nothing was found
2011 Nov 01
0
do I really need the keylogger for my computer?
My children have a great interested in my computer, they always delete my important files by accident, and my friends recommend me a keylogger (http://www.microkeylogger.com/), and I'm really worried about my working files, what should I do, could you guys give me some advice please~
2017 Sep 23
5
Different users having same home/mail_location?
...ntly. The reason I'd like to do this is to have two ways to login to the same mailbox, one using username + password and the other otherusername + otherpassword + otp-token. Basically this "otherusername" would be for cases where I don't trust the client computer to not have a keylogger etc badness in it, but still need to see my mail. I have this kind of a dual-login setup via PAM for regular system user authentication and it's working ok. I'm just wondering about the dovecot part, whether dovecot will do Unexpected Things if more than one user have the same home a...
2019 Aug 17
3
Giving full administrator privileges through sudo on production systems
Why did you say it is wrong to give full admin privileges to random users? -- An old man doll... just what I always wanted! - Clara
2017 Sep 23
1
Different users having same home/mail_location?
...>> this is to have two ways to login to the same mailbox, one using >> username + password and the other otherusername + otherpassword + >> otp-token. Basically this "otherusername" would be for cases where I >> don't trust the client computer to not have a keylogger etc badness in >> it, but still need to see my mail. >> >> I have this kind of a dual-login setup via PAM for regular system user >> authentication and it's working ok. I'm just wondering about the >> dovecot part, whether dovecot will do Unexpected Things...
2004 Apr 07
2
Requiring multiple auth mechanisms
...arly pam, so I'm not totally sure my approach makes sense for everyone's needs. My particular need was to require both public key and S/KEY factors so that one-time passwords can be combined with a strong electronic authenticator. I don't trust my users not to end up trojaned with a keylogger, so I need OTP, but I also want a public key in case someone loses his S/KEY cheat sheet. The attached patch is designed for Red Hat's openssh-3.1p1-14 SRPM (add as Patch14, use -p1 on patch line in %prep). It should work against openssh-3.8 with slight tweaks (authmethods changed in auth...
2019 Aug 17
0
Giving full administrator privileges through sudo on production systems
On Fri, Aug 16, 2019 at 8:39 PM Bagas Sanjaya <bagasdotme at gmail.com> wrote: > Why did you say it is wrong to give full admin privileges to random users? > $ sudo rm -rf / $ sudo <install keylogger of choice> $ sudo cp /etc/{passwd,shadow} $home; (run john-the-ripper against passwd/shadow files). etc etc etc. -- -john r pierce recycling used bits in santa cruz
2017 Sep 23
0
Different users having same home/mail_location?
...39;d like to do > this is to have two ways to login to the same mailbox, one using > username + password and the other otherusername + otherpassword + > otp-token. Basically this "otherusername" would be for cases where I > don't trust the client computer to not have a keylogger etc badness in > it, but still need to see my mail. > > I have this kind of a dual-login setup via PAM for regular system user > authentication and it's working ok. I'm just wondering about the dovecot > part, whether dovecot will do Unexpected Things if more than one u...
2017 Sep 24
0
Different users having same home/mail_location?
...urrently. The reason I'd like to do this is to have two ways to login to the same mailbox, one using username + password and the other otherusername + otherpassword + otp-token. Basically this "otherusername" would be for cases where I don't trust the client computer to not have a keylogger etc badness in it, but still need to see my mail. > > I have this kind of a dual-login setup via PAM for regular system user authentication and it's working ok. I'm just wondering about the dovecot part, whether dovecot will do Unexpected Things if more than one user have the same...
2005 Nov 04
0
Pacifica-enabled chip availability
Announcement of projected availability of M2 socket Pacifica-enabled chips: http://www.channelregister.co.uk/2005/11/04/amd_roadmap_update/ -- Tired of having to defend against Malware? You know: trojans, viruses, SPYWARE, ADWARE, KEYLOGGERS, rootkits, worms and popups. Then Switch to OpenBSD with a KDE desktop!!! _______________________________________________ Xen-devel mailing list Xen-devel@lists.xensource.com http://lists.xensource.com/xen-devel
2007 Jun 29
0
evbug module on centos 5
How can I get the module evbug under centos 5? I was hoping it was there by default but it is not. Can I individually compile it? If so how. I havent done kernel modules before. evbug gives me all keyboard events in syslog. I tries a couple other keyloggers but it only gave me ps/2 keys not USB keys. Thanks, I am hoping evbug will give both ps/2 and USB keys. Jerry
2003 Sep 17
0
freebsd-security Digest, Vol 26, Issue 1
...not if it is possible with the original CD, may i have an modified frm me) this allow you to mount any partition an slice on the disks in the physical system. And at this point you have loosed all the security-solutions in the BSD themselfes. You should really connect an special crafted Hardware-Keylogger. I mean you can found an plan from this whit modified cabling to log the keystrokes to an another box (doubling and logging) or to logging into the serial-interface from another box.. btw Michael
2018 Sep 17
7
add keys and certificate to forwarded agent on remote host
Apologies if this post is inappropriate to this list; please redirect me if so. Our team uses ssh extensively for server access and maintenance (Debian). An issue is acting as root when operating, for example, over ansible and keeping a record of who performed the actions, something ssh certificates solves well. The problem is then to automate certificate issuance since it would be pretty
2013 Jan 10
1
SSH from within OpenSSH
This is a request for a How-To I need to SSH from my Windows 7 laptop to several Linux machines that are inside a secondary VPN. To explain: I have a network (Call it LAN A), containing a few Windows 2K servers, that is protected by a VPN. That network connects to another one (call it LAN B), that has a few Linux server, over a separate site-to-site VPN. >From outside (here) I have no access
2018 Sep 18
3
add keys and certificate to forwarded agent on remote host
...eys. You can enforce the Yubikey so it > requires the user to enter a PIN *and* touch the Yubikey. This means > there's an incredibly high degree of confidence that it was the user > who performed the actiion (i.e. two-factor authentication of physical > Yubikey and PIN, plus anti-keylogger because of the mandatory touching > of the Yubikey). I've been meaning to try a Yubikeys. As I understand it that would help ensure that the user is the person they should be. What is nice about runtime certificate issuance is that certificates can be tuned for particular per-user, per-i...
2009 Feb 24
5
Wine runs your malware!
http://www.trustedsource.org/blog/186/Running-Windows-Malware-in-Linux So: avoid running toxic waste, and use a fresh .wine and run ClamAV over it regularly if you're fond of trying random binaries found on the Net a lot ;-) - d.
2019 Aug 17
2
Giving full administrator privileges through sudo on production systems
...he device root filesystem lives on is removed from /dev, no further damage is done. So, you will be able to mount drive on another machine and get your /etc, /home, /var, /usr/local intact ;-) Asking that question other people gave me (an them usually) a lot of fun. Valeri > $ sudo <install keylogger of choice> > > $ sudo cp /etc/{passwd,shadow} $home; (run john-the-ripper against > passwd/shadow files). > > etc etc etc. > > > > -- > -john r pierce > recycling used bits in santa cruz > _______________________________________________ > CentOS...