keylogger detector and antivirus etc

Associate
Joined
1 Apr 2004
Posts
1,125
any good free stuff out there had my paypal account hacked and my email one...

dont know how

TIA

currently just run avg up to date scan daily
 
Soldato
Joined
15 Jul 2007
Posts
4,873
Location
South West
Personally i would fork out some money and buy either Nod 32 or Kaspersky the 2 best AVs on the market

Like you said you account has been hacked would you rather be protected good or protected excellent?
 
Soldato
Joined
18 Oct 2009
Posts
11,175
Spybot might be worth using too, regularly noticed updates for detecting keyloggers. Using just 1 AV program is not enough really. Best have at least 2 anti spyware/malware programs aswell as the AV program. Some programs detect what others miss.
 
Caporegime
Joined
22 Nov 2005
Posts
45,167
Personally i would fork out some money and buy either Nod 32 or Kaspersky the 2 best AVs on the market

Like you said you account has been hacked would you rather be protected good or protected excellent?

as the poster below you says one AV is not enough.

i had KASPERSKY and still got a keygen that stole my wow login.

i know how i got the keygen and it was downloaded via a flash exploit that adobe fixed without me knowing about it until after the time.

malwarebytes found the keygen easy and its free.

spybot is also good at finding things most AV miss
 

AMG

AMG

Soldato
Joined
18 Aug 2008
Posts
4,700
Location
lincs, spalding
well anti virus itself is only intended to find and destroy virus/worms/ trojans...keyloggers is more spyware.


just a spot of bad luck I hope you find the nasty than nuke it from orbit

kerpersky (internet security, and PURE) will have defence against spy ware (mostly or I would hope so) but since its risky using a credit card on that machine than your best of with spy bot or something

A anti virus is not enough, for the most basic trangle you need a firewall, application control, and a anti virus min. Or a good internet security package
 
Last edited:
Associate
OP
Joined
1 Apr 2004
Posts
1,125
thx for the replies

anything to worry about here?

malaware

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Files Infected:
C:\Casino\Betfair Casino\_SetupCasino_395a[1].exe (Adware.Casino) -> Quarantined and deleted successfully.


avg

"C:\Documents and Settings\TH\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\1.jar-2a236e6d-79e408d6.zip:\AppletX.class";"Trojan horse Java/Downloader.P";"Moved to Virus Vault"

"C:\Documents and Settings\TH\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\1.jar-2a236e6d-79e408d6.zip";"Trojan horse Java/Downloader.P";"Moved to Virus Vault"
 
Soldato
Joined
13 Nov 2002
Posts
3,589
i know how i got the keygen and it was downloaded via a flash exploit that adobe fixed without me knowing about it until after the time.

What was the name of the flash exploit / keygen? Which browser / OS were you using?
 
Soldato
Joined
26 Mar 2007
Posts
8,936
Location
Nottinghamshire
thx for the replies

anything to worry about here?

malaware

Registry Data Items Infected:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\UpdatesDisableNotify (Disabled.SecurityCenter) -> Bad: (1) Good: (0) -> Quarantined and deleted successfully.

Files Infected:
C:\Casino\Betfair Casino\_SetupCasino_395a[1].exe (Adware.Casino) -> Quarantined and deleted successfully.


avg <-----YES WORRY ABOUT THIS BIT..!!

"C:\Documents and Settings\TH\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\1.jar-2a236e6d-79e408d6.zip:\AppletX.class";"Trojan horse Java/Downloader.P";"Moved to Virus Vault"

"C:\Documents and Settings\TH\Application Data\Sun\Java\Deployment\cache\javapi\v1.0\jar\1.jar-2a236e6d-79e408d6.zip";"Trojan horse Java/Downloader.P";"Moved to Virus Vault"
 
Caporegime
Joined
22 Nov 2005
Posts
45,167
What was the name of the flash exploit / keygen? Which browser / OS were you using?

it was months ago there was an exploit in flash where any flash image could potentially download a file onto your computer that would then execute itself via a .bat


some of the wow addon sites alowed flash signatures in the comments so a bunch of the most popular addons had flash objects in the comments that contained a keygen
 
Soldato
Joined
13 Nov 2002
Posts
3,589
it was months ago there was an exploit in flash where any flash image could potentially download a file onto your computer that would then execute itself via a .bat


some of the wow addon sites alowed flash signatures in the comments so a bunch of the most popular addons had flash objects in the comments that contained a keygen

Wow. ( pardon the pun :p )

I probably wouldn't have been affected because the Software Restriction Policy that I have in place only allows execution from "\Windows" "\Program Files" and as a Standard User, Firefox ( and its plugins ) should have no write access to either of those directories.

Or would they? I'm not very conversant with the interaction that Adobe's products have with the rest of the system.

These browser based exploits are quite interesting. You can do everything right with your defensive layers, but still fall at the last hurdle.
 
Soldato
Joined
6 Jan 2005
Posts
3,633
Location
Cambridge
Kaspersky is the best I'd say.
The problem is, when a virus or malware is made, if it's made well, it's not detected by antiviruses, so you can download something and it could be a virus but not detected by any antivirus for weeks. You just need to be careful of what you download.
 
Associate
Joined
5 Jul 2007
Posts
1,293
you could try running your browser in a sandbox ie sandboxie, or most firewalls security suites have a sandbox facility.

Im not sure how effective they are???
 
Soldato
Joined
7 Apr 2004
Posts
4,212
you could try running your browser in a sandbox ie sandboxie, or most firewalls security suites have a sandbox facility.

Im not sure how effective they are???

Yer Sandboxes are a very effective form of security, especially in the context of browsers :) However, your browser could still be compromised while in memory, for example send your credit card numbers to the bad guys. This is basically a non-persistent browser rootkit.

Of course this depends on how many levels you sandbox on, if you ran flash inside a sandbox then that would be very effective but also restrictive. If you just run your browser as a whole in a sandbox, it protects your box but not the browser. Chrome does a very good job of sandboxing different levels of the browser, and I think im right in saying a flash exploit in Chrome would be very well contained.
 
Back
Top Bottom