Keylogger Question

G

Guest

Ok, well, I wasn't trying to stir up a debate on this. I know that a lot of
keyloggers are considered trojans/malware, but some are not and are retail
products, which is why I didn't post to any AV forums as someone earlier
suggested. I have to agree with Null that some situations aren't unethical,
and monitoring your kids' computer activity being one of them. In fact,
that's why she got worried in the first place, because their oldest daughter,
at 12, was playing Runescape and chatting online, and when the phone rang one
night and her mom asked who was calling, the person on the other end of the
line said they were so and so, and they wanted to talk to the (the daughter's
name) that he played runescape with, as she had given her number to hiim
through the game. This alarmed them, so they discussed what she should and
shouldn't discuss online, and then he put the logger on, so that they could
monitor what information she was and was not giving out. Now, as far as what
is legal, and what is not, that's not really what I was concerned about. I
know that more than likely, it would be considered illegal if he were using
one, but she isn't wanting to cause any sort of a conflict with him that
might spill over to the kids as they are going through enough as it is. She
just wants to make sure that she can use the computer without her chats and
emails, etc. all being sent to him as well as who was intended in the first
place. I imagine I'm just going to have to replace the drive and have her
get another OS disk so that it can all be reloaded clean, but I was trying to
save her the expense if at all possible. I was hoping someone on here might
have run across something that has a good track record of identifying these
things, and thanks to Wesley for his suggestion at the beginning of the
thread. I had found that one already and plan on using it, but that's
exactly the type suggestion/answer I was looking to get in here. Thanks to
all who responded.

John
 
I

Ivor Jones

null2006 said:
I wholeheartedly disagree with your statement...by common
definition, malware is software (not hardware) that is
installed without the user's or owner's conscious
consent. In the situation that I stated, it is not
malware and anti-malware personnel WOULD NOT disagree
with me.

Precisely. I once used a very simple remote control application that ran
over IPX (it was on an old Novell Netware 3.2 network) and it was always
getting flagged by the anti-virus software. I kept having to tell it that
I *wanted* it to do what it was doing and *not* to erase or quarantine
it..!

Ivor
 
D

David H. Lipman

From: "Ivor Jones" <[email protected]>


|
| Precisely. I once used a very simple remote control application that ran
| over IPX (it was on an old Novell Netware 3.2 network) and it was always
| getting flagged by the anti-virus software. I kept having to tell it that
| I *wanted* it to do what it was doing and *not* to erase or quarantine
| it..!
|
| Ivor
|

That's case of a tool, not a Trojan !
This is a case of when a tool that is not in itself malicious but can be used maliciously.
Many well known utilities can be flagged this way.

for example a Process Killer. A process killing utility may be used to kill an AV
application and/or FireWall in a batch process prior to infecting a platform. That same
utility could be a helpful diagnosis and/or management tool.
 
N

null2006

David H. Lipman said:
malware is "bad" computer related "wares".
Usually applied to soft-"ware" but can be equally applied to hard-"ware".

Your definition is off to say the least.

Use a dictionary:

http://dictionary.reference.com/browse/malware

You'll see that it's SOFTWARE. Note that the source is Webster's New Millenium Dictionary of
English. Not a single word about HARDWARE.

It is YOUR definition that is off.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Similar Threads


Top