Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
Privacy Security

Anti-Keylogging Recommendations? 179

BeeazleBub writes "A friend asked me about the best programs to detect and remove spyware/logging/monitoring software that might have been placed on her computer by a spouse. Since there are a plethora of good and bad programs out there, I thought I would ask the slashdot crew for their recommendations. What is simple, reliable and most effective? I'm sure some of you have had the same question or circumstance. (No, booting from a Linux CD is not an option for this user)."
This discussion has been archived. No new comments can be posted.

Anti-Keylogging Recommendations?

Comments Filter:
  • by inTheLoo ( 1255256 ) * on Sunday May 18, 2008 @01:51PM (#23454342) Journal

    It's a domestic dispute that no one wants to get into. The obvious solution, to own your computer with free software, is not an option. All that's left is to delve into the cesspool of Winblows "solutions" and other inappropriate technical answers to an environment of broken trust.

    • by Simon (S2) ( 600188 ) on Sunday May 18, 2008 @01:54PM (#23454386) Homepage
      I agree. There is no solution. There are hardware keyloggers, software keyloggers, the spouse could log all traffic to/from the machine or take a screenshot every now and then. There is no solution to this. Trust your spouse or grap your computer and lock it somewhere only you have the key to.
      • by powerlord ( 28156 ) on Sunday May 18, 2008 @02:03PM (#23454464) Journal

        Trust your spouse or grap your computer and lock it somewhere only you have the key to.


        Too true.

        Nowadays, if you need a "trusted" computer, think about getting a Mac Airbook that you can slip into a folder in a filing cabinet when not in use, or keep with you all the time.

        Using a laptop raises the hurdle for installing a hardware keylogger (they're usually just dongles that sit between the keyboard and the computer), and using OS X should raise the bar a bit to install malware (not that it doesn't exist, it just might be more difficult to find, and navigating in OS X will be more challenging for a user not use to it).

        Using a small footprint laptop (like the Air), means you can hide it "in plain site", or in a place you can ensure physical control over (although personal control trumps al others for security).

        Realize that unless you're using encrypted protocols to browse web sites or send/receive email, your traffic could still be intercepted on the network, but that again requires a more sophisticated user than the average "Spouse who installed a keylogger".
        • But honestly, it seems like this isn't a real case. Because apparently you can't boot from a Linux Live-CD, which would make the most obvious answer of "reformat your drives with Windows" also obsolete. As for hardware keyloggers, most seem to be rather obvious if you just look at the back of your computer where the either USB or PS2 connectors for plugging in your keyboard are and if there is extra hardware there remove it. This situation is kinda like saying BASH/ZSH/CSH/Every other shell in the system ha
      • by NewbieProgrammerMan ( 558327 ) on Sunday May 18, 2008 @04:20PM (#23455452)
        Oh, there's a solution: the friend needs to uninstall their spouse.

        Honestly, if you're at the point in a relationship where you're spying on each other, it's time to just throw in the towel and find a partner you can trust.
        • Now that you're gone
          All that's left is a band of gold
          All that's left of the dreams I hold
          Is a band of gold
          And the dreams of what love could be
          If you were still here with me
  • by astrashe ( 7452 ) on Sunday May 18, 2008 @01:52PM (#23454352) Journal
    I'll bet there's a really interesting story behind this.

    Here's the answer. She's trying to solve a human problem with a technical solution. It won't work. If she has to use a suspect windows computer, there's no software that will guarantee it's clean. It can't be done.

    And if you can't trust the person you're married to, your main problems in life aren't computer problems.

    • by MBCook ( 132727 ) <foobarsoft@foobarsoft.com> on Sunday May 18, 2008 @02:01PM (#23454446) Homepage

      I agree. My first thought was "don't get involved."

      Even if you think the husband is a spouse-abusing homicidal maniac, don't do this. If there is evidence, turn him into the police. Otherwise stay out.

      She can google it. She can take it somewhere (like Best Buy, Circuit City, etc). I know their terrible, but hey. If they work things out, you are the guy who tried to help her get out of the marriage. That won't ender you to him. If things go farther, how do you think you'll be treated if there was a key-logger and your solution didn't work? If there is no key-logger and she is just reaching and scared and overwhelmed, then playing into that could make things worse (in the harder for them to get together and fix their marriage if possible sense).

      She can use another computer, reinstall Windows, whatever. Don't get in the middle of someone else's fight (unless it is to save their life or some such, in which case, again, call the police). I seriously doubt doing this will make your life easier in any way.

      Tell her to go to a private eye. Talk to a (better) divorce attorney. But tell her you don't want to get involved in this.

      • Re: (Score:3, Interesting)

        by nacturation ( 646836 ) *

        If they work things out, you are the guy who tried to help her get out of the marriage.
        I got the impression that this just might be the submitter's goal. Maybe the wife and him are having an affair and she (and he) wants to keep it from the husband.

        Either way, your and the GP's comments are spot on. There isn't a technical solution to a social problem.
         
      • If they work things out, you are the guy who tried to help her get out of the marriage.

        For what it's worth -- be aware that interference in someone else's marriage is a tort in some states. Which means that, if alleged in court, the other spouse can sue you for damages.

        Do you want to wind up in court and potentially paying for someone else's divorce? (To say nothing of a charge of adultery, which is still a crime in some states and can conceivably lead to jail time.)

        • by jafiwam ( 310805 )
          Its TWO states. And it's tremendously hard to do.

          That said, the setup is stupid. Either wipe the damn thing, or well.. wipe the damn thing.

          Seriously, it takes 4 hours at most to get windows installed, drivers, and service packs. The only reason not to do that would be pirated software, and well, you get what you pay for eh?

          Even FINDING a keylogger isn't going to do anything, if there is one, IT DOESNT PROVE THE SPOUSE DID IT. It could always come in through a hole of some kind. (If the gal is dumb enoug
      • Did you never stop to think that the poster is probably the boyfriend? He can't "not get involved" - he already is.
        • by MBCook ( 132727 )

          Actually that didn't occur to me at all. If that's the case... then the poster needs to stop trying to break up a marriage. How to remove a keylogger is far besides the point.

    • by Khaed ( 544779 )
      I agree, on all points. Anyone that suspicious either is nuts or has reason to be suspicious, and either way, they are in trouble.

      I'd like to know why "booting from a Linux CD" isn't an option, though. Even if she has to use Windows for something work related, if she's doing anything where she wants privacy, what's wrong with a LiveCD? You can use AIM and Firefox. A LiveCD and a thumbdrive she can hide for files would work pretty well for that, and she doesn't have to be that bright to do it.
      • Even if she has to use Windows for something work related, if she's doing anything where she wants privacy, what's wrong with a LiveCD?
        It's Linux, that's what. Our poster already asked his "friend" that option, and it was rejected for some existing reason.

        • Re: (Score:3, Informative)

          by Khaed ( 544779 )
          I know it's an existing reason. I want to know why:

          I'd like to know why "booting from a Linux CD" isn't an option, though.


          There's a reason I directly quoted the summary; I recognize THAT it's not an option. Why it's not an option is the question.
          • by Khaed ( 544779 )
            Dear "Offtopic" Moderator:

            Learn to read. I'm clarifying that I want to know something about the topic. That's pretty on topic. I mean, seriously:

            "I want to know why:" followed by a line from the summary is offtopic? Whatever you're smoking, you better be sharing.
    • Re: (Score:3, Insightful)

      by Idaho ( 12907 )

      Here's the answer. She's trying to solve a human problem with a technical solution. It won't work. If she has to use a suspect windows computer, there's no software that will guarantee it's clean. It can't be done.

      You are absolutely right, which pretty much ends this discussion right there.

      Normally I'd suggest to do a complete Windows reinstall (assuming you have to run Windows), or install Linux, but you can't trust a Linux machine either, if others have physical access to them (and they know what they're

  • Divorce. (Score:5, Insightful)

    by The Warlock ( 701535 ) on Sunday May 18, 2008 @02:02PM (#23454454)
    Only solution. Either the wife is spying on the guy, in which case she doesn't trust him, or the guy is baselessly convinced that his wife is spying on him, in which case he doesn't trust her. Either way, this relationship is doomed.
    • Got my genders mixed up. Regardless, my answer still holds.
    • Either way, this relationship is doomed.

      I guess I'm old-fashioned, but I'd have thought that another option would be to work on fixing the root problem, rather than just bailing on the relationship.

  • Divorce (Score:3, Insightful)

    by jps25 ( 1286898 ) on Sunday May 18, 2008 @02:05PM (#23454490)
    If trust in a relationship is gone and you have to play hide and seek, there's only one option left. Divorce.
    • Re: (Score:3, Insightful)

      Let me guess: you're single?

      "Trust" means "I trust that I know my partner, and know what they are capable of and what they can be relied upon."

      It does NOT mean "I trust my partner to do X."

      For example, my wife can't trust me to take out the trash, and I can't trust her to change the oil in our car. Does that mean we should get a divorce?

      • Re: (Score:3, Insightful)

        by Khaed ( 544779 )
        There's a huge difference between "she doesn't change the oil" and "I need to monitor every keystroke she makes."

        If you need to monitor everything someone does then you don't trust them.
    • Re:Divorce (Score:4, Insightful)

      by PachmanP ( 881352 ) on Sunday May 18, 2008 @05:34PM (#23456004)
      Divorce is messy and you lose half your stuff. Further more some take the "til death" vows seriously. This leaves open the superior option, Murder.
  • Format disk (Score:4, Informative)

    by coldfarnorth ( 799174 ) on Sunday May 18, 2008 @02:05PM (#23454492)
    Format, Reinstall. That wipes software. Splurge and buy a new keyboard if you don't trust it. Do a quick look for suspicious looking hardware. That should handle the worst. Ah, and change the locks to the house. No point going to all the trouble is the Ex-Spouse has access to the machine.
    • But if you can't use a Linux live-CD how are you going to format or reinstall? As both the Windows install CD and a Linux live-CD have just about the exact same method to boot. If one doesn't work the other one won't either (unless it is a case of the Linux CD doesn't have enough RAM but with DSL any computer made in the last like 10 years should work perfectly fine).
  • by Stradivarius ( 7490 ) on Sunday May 18, 2008 @02:06PM (#23454498)
    If I had any good recommendations for such tools, I'd give them, but I don't, so I'll try to help in another way. I'll pose some questions that hopefully your friend will be asking herself:

    1) Isn't this missing the forest for the trees? If a marriage is so lacking in trust that she thinks her spouse is spying on her, there's a problem. If her spouse actually did install such a thing, there is similarly a problem. This is a much greater problem than the software itself. If she wants to save the marriage, this is the sort of situation where a counselor or similar trusted third party could be very helpful.

    2) If the logger or other software is indeed there, what is she worried about him discovering? If she's just (rightfully) angry about the installation of this software, and trying to demonstrate a point by removing it, that's one thing. But if there actually is something she wants to hide, again this is a far bigger problem in the relationship than the software.

    Good luck to your friend. This sounds like a tough spot to be in.
  • No luck (Score:3, Insightful)

    by Peter H.S. ( 38077 ) on Sunday May 18, 2008 @02:07PM (#23454506) Homepage
    If booting of a Linux CD isn't an option because it is perceived as "too technical" no other tool can help (even booting from a clean media wouldn't help against physical keyloggers or sniffers).
    A small Asus EEE PC with a encrypted SSD, grub/bios password and hidden away may allow the person to communicate in secret with some measurement of security against non-technical opponents with limited resources, if the person is able to use some kind of SSL proxy so that the data can't be sniffed easily. Tempest attacks or even simple hidden cameras may spoil even that.

    So, get a divorce instead.

    --
    Regards
  • Simple (Score:5, Funny)

    by Bill, Shooter of Bul ( 629286 ) on Sunday May 18, 2008 @02:21PM (#23454600) Journal
    Just install a key logger of your own. Then you'll be able to see any access he's been making, including any to the keylogger he has installed.

    From my own experience, Tin foil hats are good, but access to the government computers to make sure they aren't after you is more comforting to me.

    Note to federal agents: I have not gained access to your computers. And you might want to change your desktop wallpaper, scantily clad women on a work computer is just begging for a lawsuit.
  • Although the least likely to happen is to check for hardware keyloggers first. They're in meatspace so it should be pretty damn easy to spot. Next would be booting from a Linux Live CD like Knoppix or something and using that instead of the potentially compromised computer.

    Lastly, the guy should divorce her. If she's spying on him its to find grounds for a divorce that will net her a nice chunk of change in the settlement. Probably saying something stupid like he's surfing porn (what guy doesnt?) is the sam
    • by FSWKU ( 551325 )
      If booting from a Live CD isn't an option (which was said even in the summary, do people not even read THAT anymore?), then she's going to have ZERO clue what a hardware keylogger looks like.

      Anyway, several people here have already stated the blindingly obvious, and I'll agree with it 100%. If things are to the point where this is even a question, then the marriage is doomed. She doesn't trust him to not spy on her, and if he IS spying, then he doesn't trust her. Communication Fail and Trust Fail built i
  • Impossible (Score:3, Insightful)

    by Just Some Guy ( 3352 ) <kirk+slashdot@strauser.com> on Sunday May 18, 2008 @02:31PM (#23454686) Homepage Journal

    There's no way to be 100% certain that nothing's being logged. Possible data gathering points:

    • Software logger in the OS
    • Rootkit
    • Keyboard plugged into a hardware logger
    • Keyboard contains a hardware logger
    • Computer case contains a hardware logger
    • Linksys router is actually running Linux, using tcpdump to log outbound packets or forward them to another computer

    No, there is no software you can run that will tell you if you're being monitored, by virtue of the fact that such software is impossible.

    Have her get a cheap laptop - maybe an Eee PC - and configure OpenVPN to a friendly router. You're a geek, right? If you're serious about her privacy, make it happen.

    • Re:Impossible (Score:5, Informative)

      by caitriona81 ( 1032126 ) <sdaugherty@gmDEGASail.com minus painter> on Sunday May 18, 2008 @04:00PM (#23455316) Journal
      More possible data gathering points:
      • Previously compromised accounts (email/chat/google web history)
      • Email forwarding settings (yes this is overt, but how many users actually look at their forwarding rules)
      • Recoverable "deleted" files on disk
      • Browser plugins
      • Saved passwords - even if they are "encrypted" any encryption that allows the application to read the password lets someone else do so as well.
      Solutions to these additional threats:
      • Every time a compromise is suspected, change all passwords from a secure computer immediately.
      • Check forwarding rules, particularly to web-based email services.
      • Always use SSL/TLS encryption whenever they are available. Learn not to give passwords over unencrypted channels - this won't help you against a keylogger, but it will help you against sniffing.
      • Be aware that "deleting" files doesn't really delete them unless you use specialized tools
      Further protection against keyloggers.
      • Reformat.
      • Make your computer as tamper-evident as possible. Buy a UPS so that if the computer reboots, there will be a reason for it. Keep the computer turned on. Secure all accounts on the computer with a password. If it's Windows, encrypt the SAM database with a password that you have to enter at bootup. Remove your own administrator rights, and have a separate administrator account that you only use to install software. Use a BIOS password. Disable booting from anything other than the hard drive. Install physical locks on the case to prevent it from being opened. Epoxy over the screws on the keyboard (after you've bought a new one).
      • Use an alternative web browser.
      • Be careful about opening links and attachments in email. Learn about phishing, particularly the type of targeted phishing that can be attempted by someone with intimate knowledge of their target. (Don't trust the return address on mails in particular - many of the keyloggers out there get on via a trojan horse that you have to be tricked into running)
      • If any evidence of tampering is found, start over.
      • Learn about computer security. http://www.cert.org/homeusers/ [cert.org] is one of the best starting places for non-technical users. Even if you don't understand it all, you have a starting place to ask questions.
      • Remember, trust is the enemy of security. Look for it. Understand how it makes you vulnerable, and decide if the risks are acceptable or not. This mindset extends all the way from the bare metal up to the human being at the keyboard. You have to start to think that way to really be able to keep a computer secure.
  • by rwa2 ( 4391 ) * on Sunday May 18, 2008 @02:36PM (#23454718) Homepage Journal
    C'mon, this is Slashdot.

    Obviously you just modify your space bar and numlock LED drivers to perform all I/O in morse code.

    Then you type in and display bunch of misleading information to entrap the eavesdropper into doing something silly / stupid / illegal and nab 'em on it.

    As far as still being able to check your email and bank accounts and stuff without compromising your passwords, just set up some kind of password vault that uses biometric authentication or something so you never have to type in your actual login / password on the untrusted machine. You'd have to do the setup for the private key and all on a trusted system of course.
  • by Cruciform ( 42896 ) on Sunday May 18, 2008 @02:42PM (#23454764) Homepage
    Most people are assuming that the spouse resides in the same residence. If the spouse is already out of the house due to separation, and is possibly using spyware/hardware to collect information for blackmail or court, then there is the option of having someone over to purge the system and visually inspect it.
    Any networking hardware like routers that could be compromised would need to be replaced or reflashed. Since she doesn't have the capability of dealing with a boot CD, her only option is third party intervention or going to the library to use their computers.
    We're missing too much info...
    How tech savvy is the spouse? Does he still live there? What kind of network setup is being used? etc. etc.
    • Really, get some floppies and install Slackware 11.0.
  • And deliver anything personally.

    And nuke the site from orbit. It's the only way to be sure.
  • Install linux, next problem.

    On either system good virus scanner will keep you covered from 95% of keyloggers so your fine unless you married a geek, but if you married a geek you'd be running linux/bsd anyway (possibly with a custom filesystem)
  • A friend.... (Score:4, Insightful)

    by wbren ( 682133 ) on Sunday May 18, 2008 @02:53PM (#23454858) Homepage

    A friend asked me about...
    A friend... riiiiiight....
    • It is definitely the stereotypical mislead, but I don't think it is of the context which you infer (meaning, I don't think the submitter is the friend). Let's take a closer look:

      A friend asked me about the best programs to detect and remove spyware/logging/monitoring software that might have been placed on her computer by a spouse.

      When trying to be vague, as this person is, the whole "on her computer by a spouse" is really too much information. Should we really care that it was the spouse? Isn't it equa
      • Actually, I think "spouse" is pretty relevant. Think your babysitter's digging through your hard drive? Get a new one. Don't trust your maid? Get a new one. Landlord gives you the creeps? Move. But it'd be a whole lot harder to just get rid of a spouse (ask Hans), and the emotional consequences for doing so are hopefully more significant than deciding not to hire the same plumber next time.

  • For software keyloggers, you can use a tool like SpyBot [safer-networking.org] to try to find them -- however, I can't guarantee it'll find your specific keylogger, if there is one. There's probably better software at this point, but I haven't used Windows in years.

    Another option is to use Windows' built-in search, and search for files modified in the past couple days. If there's a keylogger, odds are its log files will show up. I've accidentally found a keylogger on a friend's computer this way.

    Another option is to use a liv

  • by florescent_beige ( 608235 ) on Sunday May 18, 2008 @03:24PM (#23455074) Journal
    Comes to /. for technical advice: good!

    Gets from /. relationship advice: o noes!!!!
  • It's really easy to say "If the relationship's that broken, just divorce."

    It's also badly missing the realities.

    If there's that much paranoia, odds are one or both parties are moving towards divorce but know they need to do a bunch of things to either avoid getting screwed in the process (or, if they're malicious, screw the other side).

    From experience with friends going through divorce, you should really be doing a bunch of things before you turn the cold war hot:

    You should ensure there's money to pay for l
    • by jafiwam ( 310805 )
      Infidelity doesn't matter.

      The courts care about;

      - kids
      - assets
      - giving as much (of the two above) to women as possible

      Yeah, if you are thinking your marriage is rotten, there's good reason to get proof to motivate you to end it. But, photos of a spouse at a hotel mean exactly dick in divorce court. They might mean something for child custody, but that's about it.
  • Why do... (Score:4, Funny)

    by geekboy642 ( 799087 ) on Sunday May 18, 2008 @03:57PM (#23455284) Journal
    Why do these moronic ask slashdot questions always rule out the one useful answer in the very question?

    "A Linux live CD is not an option". Bullshit. You windows-swilling pansy, grow some balls and try Linux. It won't kill you, it won't make you gay, and it won't rape your dog. Are you terrified of being free from >99% of viruses/trojans/spyware/adware/rootkits? Is there some kind of Stockholm syndrome going on here? You LIKE it when windows beats you, don't you? You hide the bruises, that's why you always wear those sweaters.

    You sick, twisted fuck.
    • by Nimey ( 114278 )

      it won't make you gay, and it won't rape your dog
      Shit. I must have used the wrong distribution, then.

      My dog still hasn't forgiven me.
      • it won't make you gay, and it won't rape your dog
        Shit. I must have used the wrong distribution, then.

        My dog still hasn't forgiven me.
        You must have used Gentoo then.

        The flag you want is --NO_VIOLATE_FIDO
  • detecting malware .. (Score:3, Informative)

    by rs232 ( 849320 ) on Sunday May 18, 2008 @04:00PM (#23455318)
    Under Windows, there is no sure way of detecting malware once it's already installed, as it takes steps to hide itself.

    The only sure way is a clean install or re-imaging from a hidden partition at boot. Something that would be a pain to set up and probably wouldn't even work with the current incarnation of Windows.

    Your bet bet is to get your friend to install these Sysinternals [slashdot.org]">utilitys and see if they can detect the keylogger by its activity. Monitoring activity [wireshark.org] at the firewall is also a good place to detect suspicious activity.

    What is it about Windows that your friend absolutly needs to use. Are there alternatives [slashdot.org] out there.

    If you absolutly can't survive without Microsoft applications then why not use a version of Linux that comes with CrossOver [codeweavers.com], this allows Windows applications to run natively on Linux, without the the same level of malware threat. Eg, by clicking on an URL or opening an email attachment.
  • by pbhj ( 607776 ) on Sunday May 18, 2008 @04:45PM (#23455636) Homepage Journal
    If the problem is being spied on by their spouse then using a computer outside the home sounds the best option.

    I did a website for a women's aid group ("WA"), they wanted information about how to keep it hidden from an abusive partner that the women were in touch with WA. I did a review of what the national centers gave as advice, including details of removing history files and such. In the end I settled for the only method being to use a public computer (eg at a library).

    Someone else can spy on you for sure, but unless your partner works at the City IT center or for the library (or wherever) then it's not going to be your partner spying on you.

    If you _need_ to get out the house and contact someone and your being abused and can't - please call directory enquiries and contact your local Womens' Aid organisation. They can advise you, give you temporary accommodation in a safehouse, help you talk to the police, help you seek mediation; basically empower you to take back control of your situation.
  • by Skylinux ( 942824 ) on Sunday May 18, 2008 @05:41PM (#23456046) Homepage
    Since most of the posts are not answering your question at all, here are some programs which can help.

    I have been fixing Windows computers for over 10 years and can suggest the following programs from personal experience. There is no guarantee that they will find all keyloggers but they will detect the progs you find by using google.

    1) Spybot Search & Destroy (free) http://www.safer-networking.org/ [safer-networking.org]
        This is a spyware checker, cleaner. It will also find keyloggers and screen capturing software
    2) Antivir (free for personal use) http://www.free-av.com/ [free-av.com]
        This is an Antivirus / malware program which I have found to kick the shit out of Norton Antivirus (Personal + Corporate) and McAfee.
    3) Norton Antivirus 2008 (not free)
        This is another antivirus program, it is not as good as Antivir but it may contain different malware signatures then Antivir.
    4) Adaware (free) http://www.lavasoftusa.com/ [lavasoftusa.com]
        Like Spybot but less strict, I don't use it anymore but you should run it anyway.
    5) Windows Defender (free) http://www.microsoft.com/athome/security/spyware/software/default.mspx [microsoft.com]
        This one is made (purchased) by Microsoft and is actually quite good, I can highly recommend it to remove crap from a computer. This one is free and includes an "active shield"

    If you run suggestions 1,2,4 and 5 above you can assume that your computer is clean. To be sure format and reload.

    As for the rest, follow the advice above and end the relationship....
    • The questioner says she can't run a live-CD. I can only imagine that's a problem of her ability with computers; in which case installing, scanning, interpreting, then properly removing the software is probably going to be too onerous for her.

      He's going to know that she has scanned for spyware, it'll be in his keylogger info.

      IMHO the solution is to use a different computer that the spouse could not have accessed, eg at a library or cybercafe.

      If they wanted suggestions for combating keyloggers then they shoul
    • by hacker ( 14635 )

      All good points, except #2.

      Stay far, FAR away from Avira. Not only does it hang, seize up and fail to complete its own updates and scans, but it drags system resources down tenfold more than the other alternatives.

      It also requires the "questionable" use of quite a few daemons which don't seem to be necessary with the other free AV products (like ClamAV, AVG Free and so on).

  • Keyloggers are designed to hide. Hence, while non-experts may be able to get lucky with some, with others they will not stand a chance. Sorry.

    However the problem is different. In most juristiction, installing a keylogger is a criminal act. One that could well tip the balance in a divorce proceedings. (I expect divorce will be the next step here, as things cannot really work out anymore: One or both partners are paranoid, and there is no trust left.) So if there is good reason to believe in the presence of a
  • For sensitive things like typing in passwords to financial sites, a graphical authentication should be utilized wherein the user "types" with her mouse. But, as has been pointed out, there is no 100% safe protection.
  • Simply boot a Knoppix CD and use that. Physically check for hardware keyloggers and you are done.
  • Given that software keyloggers can be found, (rootkit detector and an encrypted partition) is it possible, perhaps only theoretically, to protect youself from phyical keyloggers without taking your keyboard apart?
    Do hardware keylogers supply thier own batteries or could it their power usage be (again theoretically) detected?
    Do they log messages from they computer to the keyboard (e.g lock changed)? could anti key loggers spam the keyboard with lock toggles until the memory fills up?
    With the ones that dump t
  • Come back to the guild.
  • If you don't trust the machine, format and re-install it.
  • I'm sensing two people trying to keep a relationship hidden from a spouse. Whether it's physical, long-distance via AIM/email or whatever.

    Huge paranoia probably due to the person you're afraid of intercepting something incriminating is still in the house?

    If my theory isn't the case, tell your friend to get out. Go to family, a shelter, anything. Just get the F out. If there's nothing sinister under the surface here, that's not a healthy relationship. Get. Out. Of. It.

    If my suspicions prove accurate, I can s
    • by jafiwam ( 310805 )
      Just to drive this point home.

      The only thing that stopped me from doing some crap like that, was recognizing that it would ultimately be a self-destructive act. I had all sorts of violence planned for the guy that broke up my marriage, but stopped for two reasons; a) I would get caught and b) it would have killed his dogs too. (I like animals.)

      Despite being an ordinarily very caring and nice person, I was ready to do these things. Pile on it worse, is the spouse has a relationship with them, but NOT so mu
  • Meddling in two people's fucked up relationship? Sounds like a great way to get yourself into a position to have your ass sued off. Or maybe you'll get lucky and play a role in triggering a murder or suicide. What are you, an idiot? Run the fuck away.
  • What is simple, reliable and most effective?

    Tell your friend to get a lancet, puncture her finger and splash a drop of blood on a vertical surface somewhere in her home which is fairly obvious.

    Have her just vanish. Tell her to leave her passport behind and on no account to touch her bank accounts. Once you are sure she is out of harm's way, Tell the local police that your friend is missing.

    Uncle Sams's paranoid police and vindictive legal system will do all the dirty work for her, and keep her (ex-)

    • by Ihlosi ( 895663 )
      Tell your friend to get a lancet, puncture her finger and splash a drop of blood on a vertical surface somewhere in her home which is fairly obvious.



      Don't forget the part about flooding the car so there's inch-deep standing water in it. Even if the spouse in question manages to escape the clutches of the legal system, their car will still be messed up (bonus if it was an expensive car).

  • This isn't about your spouse wanting to read your email, it's about your spouse not trusting you.

    You need relationship counciling, not security software.
  • There's very little you can do about this, to be honest. A determined person with that sort of access to a computer is only going to be defeated by someone with the same level and amount of access: your friend herself. You won't be able to keep up.

    Nor, frankly, should you. This is a sign of some serious problems in that relationship. Your friend might be to blame, or her spouse might be to blame, or the concept of blame might not even apply; it's tough to tell with the little information here. But the solut

The Tao is like a glob pattern: used but never used up. It is like the extern void: filled with infinite possibilities.

Working...