-
July 3rd, 2008, 03:19 AM
#11
Just be careful liberating these keyloggers. If you get caught, they might think you put it there.
-
July 3rd, 2008, 07:13 AM
#12
Originally Posted by CyberB0b
Just be careful liberating these keyloggers. If you get caught, they might think you put it there.
lol i was caught removing one earlier last year, i was lucky that the person at the cafe had a idea about tech stuff so a quick explanation, a review or the security tape revealed i was clear.
They discovered it was one of there other staff members whom was stealing ebay / paypal credentials.
And johnno, i have not tried nor thought about trying out the microwave suggestion. I would throw one in the microwave but i'm sure the missus would tear me a new one if i destroyed this microwave like i did the last one..
Mee and my crazy ideas
-
July 3rd, 2008, 11:45 AM
#13
I'd setup a purely open wireless network with the idea that I can both view and edit the content people are browseing. Restruants and cafe's shouldn't have any problem doing the same thing.
Keylogging sounds so uh... 1990s.
-
July 3rd, 2008, 01:20 PM
#14
Good idea there ... Well I went to an internet cafe yesterday jsut to see the setup and their cases were in a closed container so I couldnt really check...
Where do you get these hardware key loggers, I am sure they are used for legal purposes for something and are freely available?
The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
Albert Einstein
-
July 3rd, 2008, 01:32 PM
#15
I'd setup a purely open wireless network
That would imply that you were the administrator?
Keylogging sounds so uh... 1990s.
Yes, just as wiretaps and bugs are 1940/50s, but they are still used today.
The presence of a hardware keylogger suggests an attack by a third party who does not have sufficient authority to install a software one and/or is afraid of it being discovered by a software scan.
I would guess that 95% of non-IT users are not aware that these things exist, even though they might be aware of software keyloggers.
EDIT @Cider
http://www.google.co.uk/products?cli...le&output=html
Last edited by nihil; July 3rd, 2008 at 01:40 PM.
-
July 3rd, 2008, 02:01 PM
#16
Thanks Nihil
Records a years worth of typing, OMG!!!!!
I suppose that the intruder will have to sift through the code or probaly use a software program.
BTW: Why are these for sale? WHat are they used for "legally"
The world is a dangerous place to live; not because of the people who are evil, but because of the people who don't do anything about it.
Albert Einstein
-
July 3rd, 2008, 02:28 PM
#17
Cider,
As far as I know they do exactly the same as a software keylogger, only offline and outside of the target PC. I would imagine that they have some sort of management application, just like the software versions?
I am not sure of a legal use, but I suppose that if you want to permanently monitor a large number of machines on a network, you don't want them running locally and phoning home because of bandwidth and performance issues. Similarly if stuff is stored on the local machine it would be potentially vulnerable. These devices do the same thing as installed software, but without any performance or bandwidth issues.
Personally I agree with The-Spec in that keylogging is pretty much an obsolete concept from a network environment viewpoint. There are plenty of network security and management tools around, that control things by exception, and are far easier to interpret.
However they are still very much current for criminal activity.
-
July 3rd, 2008, 07:53 PM
#18
Originally Posted by nihil
Can you get hold of those Zimbabwe banknotes for millions of whatevers (dollars?).............. I have an idea for making some AOers some money for Christmas ............ and yourself of course!
oohhh....hmmmm-- Count me in!
Originally Posted by nihil
That would imply that you were the administrator?
nihil, we all know the answer to that question
Last edited by C:\Saw; July 3rd, 2008 at 07:55 PM.
"...to give correctly is to give them what they need from us, for it would not be skillful to bring gifts to anyone that are in no way needed."
--Socrates
*Einstein Would Be Proud*
-
July 8th, 2008, 08:37 PM
#19
Ok, silly question, but they the need for devices when there's plenty of software out there that does the same thing?
Are they just getting lazy now?
Or perhaps this is for use by thieves who don't have access to install the software?
Similar Threads
-
By Tiger Shark in forum Microsoft Security Discussions
Replies: 5
Last Post: January 14th, 2005, 08:47 PM
-
By moxnix in forum *nix Security Discussions
Replies: 2
Last Post: October 23rd, 2004, 05:28 PM
-
By Cybr1d in forum Hardware
Replies: 5
Last Post: July 30th, 2003, 11:00 PM
-
By sumdumguy in forum Miscellaneous Security Discussions
Replies: 9
Last Post: April 28th, 2002, 04:39 AM
-
By zigar in forum Miscellaneous Security Discussions
Replies: 1
Last Post: February 26th, 2002, 12:30 AM
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|