Displaying 20 results from an estimated 27 matches for "keyloggers".
2011 Oct 26
1
Re: Keylogger question
...automatically to monitor the system each time linux starts or each time i start some wine application.
> By the way i used antivirus to scan linux and wine directories and nothing was found
In my experience, the keylogger is invisible, and it run with other applicatioons. What's more, most keyloggers are undetectable. While, I know a very simple way to detect it. Type CTRL + ALT + DELETE, it will open your Task Manager, Processes tab look for BKP. exe or AKL. exe, if you find the BKP. AKL exe or. exe's why you have keylogger.
* Remembering that if you can not always detect Keylogger by CTR...
2011 Oct 18
1
Re: Keylogger question
...onitor to check for unknown process. This system tool will allow you to view the programs (processes) currently running on your computer.
Step 2 Check and Research any unfamiliar processes running in your ctivity Monitor? Critical system processes sometimes have unrecognizable names, however, and keyloggers may have a name that sounds legitimate.
Step 3 Download and install a mac keylogger (http://www.amackeylogger.com) detector or another software firewall. This type of mac software alerts you when another program tries to connect to the Internet. It will detect a keylogger for mac before it sends...
2011 Oct 27
0
Re: Keylogger question
Martin Gregorie wrote:
> On Wed, 2011-10-26 at 02:38 -0500, isobella wrote:
>
> > In my experience, the keylogger (http://www.microkeylogger.com) is invisible, and it run with other
> > applicatioons. What's more, most keyloggers are undetectable. While, I
> > know a very simple way to detect it. Type CTRL + ALT + DELETE, it will
> > open your Task Manager, Processes tab look for BKP. exe or AKL. exe,
> > if you find the BKP. AKL exe or. exe's why you have keylogger.
> > * Remembering that if yo...
2009 Jun 13
7
Keylogger question
My wow account was hacked and since i logged in more from ubuntu than windows i wanted to ask if it is possible a keylogger to be installed through wine and if it could start automatically to monitor the system each time linux starts or each time i start some wine application.
By the way i used antivirus to scan linux and wine directories and nothing was found
2011 Nov 01
0
do I really need the keylogger for my computer?
My children have a great interested in my computer, they always delete my important files by accident, and my friends recommend me a keylogger (http://www.microkeylogger.com/), and I'm really worried about my working files, what should I do, could you guys give me some advice please~
2017 Sep 23
5
Different users having same home/mail_location?
Hello,
Will I be breaking something if I have two users share the same home
and/or mail_location (maildir format) in dovecot? Mail will only be
delivered to the primary user, the other would be used every now and
then to login via imap (webmail).
This would be on a CentOS 7 box running dovecot from the packaging
system, i.e. dovecot-2.2.10-8.el7 currently. The reason I'd like to do
this
2019 Aug 17
3
Giving full administrator privileges through sudo on production systems
Why did you say it is wrong to give full admin privileges to random users?
--
An old man doll... just what I always wanted! - Clara
2017 Sep 23
1
Different users having same home/mail_location?
Hello Peter,
I'm using a virtual users model in dovecot where all the mail is stored
under the same OS user account anyway, so file/dir permissions won't be
a problem. The system users I was referring to are actually completely
separate user accounts at the moment with their own uid/gid (and
passwordless sudo between them), but I guess they could use same uid/gid
and just have
2004 Apr 07
2
Requiring multiple auth mechanisms
I looked around for a while, but couldn't find any code for requiring multiple
authentication mechanisms in openssh. So I wrote an implemention.
I thought at first I should change the PasswordAuthentication,
PubkeyAuthentication, etc. keywords to allow no/yes/required. But there's some
funky stuff in auth2.c with respect to keyboard interactive auth that would make
this kind of
2019 Aug 17
0
Giving full administrator privileges through sudo on production systems
On Fri, Aug 16, 2019 at 8:39 PM Bagas Sanjaya <bagasdotme at gmail.com> wrote:
> Why did you say it is wrong to give full admin privileges to random users?
>
$ sudo rm -rf /
$ sudo <install keylogger of choice>
$ sudo cp /etc/{passwd,shadow} $home; (run john-the-ripper against
passwd/shadow files).
etc etc etc.
--
-john r pierce
recycling used bits in santa cruz
2017 Sep 23
0
Different users having same home/mail_location?
Hello Tapia,
You are going to great lengths :) I assume, that PAM working means,
"user" and "otheruser" are the names of system-users with the same uid,
home etc? Then I do not see, why dovecot, all defaults and
authenticating against PAM won't work out of the box, shouldn't it?
Peter
Am 2017-09-23 um 22:08 schrieb Tapio Sokura:
> Hello,
>
> Will I be
2017 Sep 24
0
Different users having same home/mail_location?
> On 23 Sep 2017, at 23.08, Tapio Sokura <oh2kku at iki.fi> wrote:
>
> Hello,
>
> Will I be breaking something if I have two users share the same home and/or mail_location (maildir format) in dovecot? Mail will only be delivered to the primary user, the other would be used every now and then to login via imap (webmail).
>
> This would be on a CentOS 7 box running
2005 Nov 04
0
Pacifica-enabled chip availability
Announcement of projected availability of M2 socket Pacifica-enabled chips:
http://www.channelregister.co.uk/2005/11/04/amd_roadmap_update/
--
Tired of having to defend against Malware?
You know: trojans, viruses, SPYWARE, ADWARE,
KEYLOGGERS, rootkits, worms and popups.
Then Switch to OpenBSD with a KDE desktop!!!
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2007 Jun 29
0
evbug module on centos 5
How can I get the module evbug under centos 5?
I was hoping it was there by default but it is not.
Can I individually compile it? If so how. I havent done kernel modules
before.
evbug gives me all keyboard events in syslog.
I tries a couple other keyloggers but it only gave me ps/2 keys not USB
keys.
Thanks, I am hoping evbug will give both ps/2 and USB keys.
Jerry
2003 Sep 17
0
freebsd-security Digest, Vol 26, Issue 1
Hi,
you should also disable the booting from cdrom or
better remove the connctor-cable from the cdrom-drive.
I be an experienced Admin and I know how to mount bsd-partitions
w/o any logging.....use the SuSE-8.2 cdrom and start the rescue-system
(i know not if it is possible with the original CD, may
i have an modified frm me) this allow you to mount any partition
an slice on the disks in the
2018 Sep 17
7
add keys and certificate to forwarded agent on remote host
Apologies if this post is inappropriate to this list; please redirect me
if so.
Our team uses ssh extensively for server access and maintenance
(Debian). An issue is acting as root when operating, for example, over
ansible and keeping a record of who performed the actions, something ssh
certificates solves well.
The problem is then to automate certificate issuance since it would be
pretty
2013 Jan 10
1
SSH from within OpenSSH
This is a request for a How-To
I need to SSH from my Windows 7 laptop to several Linux machines that are
inside a secondary VPN.
To explain: I have a network (Call it LAN A), containing a few Windows 2K
servers, that is protected by a VPN. That network connects to another one
(call it LAN B), that has a few Linux server, over a separate site-to-site
VPN.
>From outside (here) I have no access
2018 Sep 18
3
add keys and certificate to forwarded agent on remote host
On 18/09/18, Tim Jones (b631093f-779b-4d67-9ffe-5f6d5b1d3f8a at protonmail.ch) wrote:
...
> So issue your users with Yubikeys. You can enforce the Yubikey so it
> requires the user to enter a PIN *and* touch the Yubikey. This means
> there's an incredibly high degree of confidence that it was the user
> who performed the actiion (i.e. two-factor authentication of physical
>
2009 Feb 24
5
Wine runs your malware!
http://www.trustedsource.org/blog/186/Running-Windows-Malware-in-Linux
So: avoid running toxic waste, and use a fresh .wine and run ClamAV
over it regularly if you're fond of trying random binaries found on
the Net a lot ;-)
- d.
2019 Aug 17
2
Giving full administrator privileges through sudo on production systems
> On Aug 16, 2019, at 11:12 PM, John Pierce <jhn.pierce at gmail.com> wrote:
>
> On Fri, Aug 16, 2019 at 8:39 PM Bagas Sanjaya <bagasdotme at gmail.com> wrote:
>
>> Why did you say it is wrong to give full admin privileges to random users?
>>
>
>
> $ sudo rm -rf /
>
I like this one. Long-long ago it was one of the ?tricky? questions at the