Keyboard Threat - Page 2
Page 2 of 2 FirstFirst 12
Results 11 to 19 of 19

Thread: Keyboard Threat

  1. #11
    Senior Member
    Join Date
    Nov 2001
    Posts
    127
    Just be careful liberating these keyloggers. If you get caught, they might think you put it there.
    sandwich.

  2. #12
    Senior Member t34b4g5's Avatar
    Join Date
    Sep 2003
    Location
    Australia.
    Posts
    2,391

    Wink

    Quote Originally Posted by CyberB0b
    Just be careful liberating these keyloggers. If you get caught, they might think you put it there.
    lol i was caught removing one earlier last year, i was lucky that the person at the cafe had a idea about tech stuff so a quick explanation, a review or the security tape revealed i was clear.

    They discovered it was one of there other staff members whom was stealing ebay / paypal credentials.

    And johnno, i have not tried nor thought about trying out the microwave suggestion. I would throw one in the microwave but i'm sure the missus would tear me a new one if i destroyed this microwave like i did the last one..

    Mee and my crazy ideas

  3. #13
    Banned
    Join Date
    Jan 2008
    Posts
    605
    I'd setup a purely open wireless network with the idea that I can both view and edit the content people are browseing. Restruants and cafe's shouldn't have any problem doing the same thing.

    Keylogging sounds so uh... 1990s.

  4. #14
    Only african to own a PC! Cider's Avatar
    Join Date
    Jun 2003
    Location
    Israel
    Posts
    1,683
    Good idea there ... Well I went to an internet cafe yesterday jsut to see the setup and their cases were in a closed container so I couldnt really check...

    Where do you get these hardware key loggers, I am sure they are used for legal purposes for something and are freely available?
    The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
    Albert Einstein

  5. #15
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,190
    I'd setup a purely open wireless network
    That would imply that you were the administrator?

    Keylogging sounds so uh... 1990s.
    Yes, just as wiretaps and bugs are 1940/50s, but they are still used today.

    The presence of a hardware keylogger suggests an attack by a third party who does not have sufficient authority to install a software one and/or is afraid of it being discovered by a software scan.

    I would guess that 95% of non-IT users are not aware that these things exist, even though they might be aware of software keyloggers.

    EDIT @Cider

    http://www.google.co.uk/products?cli...le&output=html
    Last edited by nihil; July 3rd, 2008 at 02:40 PM.
    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?

  6. #16
    Only african to own a PC! Cider's Avatar
    Join Date
    Jun 2003
    Location
    Israel
    Posts
    1,683
    Thanks Nihil

    Records a years worth of typing, OMG!!!!!

    I suppose that the intruder will have to sift through the code or probaly use a software program.

    BTW: Why are these for sale? WHat are they used for "legally"
    The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
    Albert Einstein

  7. #17
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,190
    Cider,

    As far as I know they do exactly the same as a software keylogger, only offline and outside of the target PC. I would imagine that they have some sort of management application, just like the software versions?

    I am not sure of a legal use, but I suppose that if you want to permanently monitor a large number of machines on a network, you don't want them running locally and phoning home because of bandwidth and performance issues. Similarly if stuff is stored on the local machine it would be potentially vulnerable. These devices do the same thing as installed software, but without any performance or bandwidth issues.

    Personally I agree with The-Spec in that keylogging is pretty much an obsolete concept from a network environment viewpoint. There are plenty of network security and management tools around, that control things by exception, and are far easier to interpret.

    However they are still very much current for criminal activity.
    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?

  8. #18
    Senior Member C:\Saw's Avatar
    Join Date
    Jan 2008
    Posts
    125
    Quote Originally Posted by nihil
    Can you get hold of those Zimbabwe banknotes for millions of whatevers (dollars?).............. I have an idea for making some AOers some money for Christmas ............ and yourself of course!
    oohhh....hmmmm-- Count me in!

    Quote Originally Posted by nihil
    That would imply that you were the administrator?
    nihil, we all know the answer to that question
    Last edited by C:\Saw; July 3rd, 2008 at 08:55 PM.
    "...to give correctly is to give them what they need from us, for it would not be skillful to bring gifts to anyone that are in no way needed."
    --Socrates

    *Einstein Would Be Proud*

  9. #19
    Ok, silly question, but they the need for devices when there's plenty of software out there that does the same thing?

    Are they just getting lazy now?

    Or perhaps this is for use by thieves who don't have access to install the software?

Similar Threads

  1. Network Security made easy?
    By Tiger Shark in forum Microsoft Security Discussions
    Replies: 5
    Last Post: January 14th, 2005, 08:47 PM
  2. Apache update opens the door to a bigger threat
    By moxnix in forum *nix Security Discussions
    Replies: 2
    Last Post: October 23rd, 2004, 06:28 PM
  3. BIOS Power-On Self Test (POST)
    By Cybr1d in forum Hardware
    Replies: 5
    Last Post: July 31st, 2003, 12:00 AM
  4. HP multimedia keyboard spyware
    By sumdumguy in forum Miscellaneous Security Discussions
    Replies: 9
    Last Post: April 28th, 2002, 05:39 AM
  5. some interesting keyboard issues...
    By zigar in forum Miscellaneous Security Discussions
    Replies: 1
    Last Post: February 26th, 2002, 12:30 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •