Ignore the typos - I've started a month of catacact surgery/rehap and 
dow't see wornth a....???

With written permssion, install BackOriface on that person's sysem.  Let 
them work as usual for a while.  Then show him what is captured.

Point out that even "ssafe and known sites" can be poisoned, and trojans 
can thus be downloaded even with "safe priactices".  The keyloggers 
capture strokes prior to encryption.  Most firewalls allow all traffic 
from "trusted" to "untrusted", so that won't stop a hidden FTP server from 
sending out the data.
--------------------------------------
Richard McClary, Systems Administrator
ASPCA Knowledge Management
1717 S Philo Rd, Ste 36, Urbana, IL  61802
217-337-9761
http://www.aspca.org


Blaine Fleming <[EMAIL PROTECTED]> wrote on 01/24/2008 11:03:11 PM:

> I have a client that refuses to believe that spyware with keylogging 
> captures anything of value.  They are convinced that since they are on 
> secure banking sites that nothing can get that information.  I'm hoping 
> that someone out there has a copy (redacted of course) of the data sent 
> by a keylogger.  It needs to be from a software keylogger preferably one 

> installed by malware.  I know I can produce this data myself but I don't 

> want it to look false and intentionally generated.  Any help would be 
> greatly appreciated.
> 
> --Blaine
> 
> ~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
> ~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~


~ Upgrade to Next Generation Antispam/Antivirus with Ninja!    ~
~ <http://www.sunbelt-software.com/SunbeltMessagingNinja.cfm>  ~

Reply via email to