Question:

Does anyone know about keylogging?

by  |  earlier

0 LIKES UnLike

Someone or something has very recently attempted to record my keystrokes. Fortunately their attempt was disrupted. However, I would like to know how they were able to access my computer in the first place. Might anyone have some ideas? Also, why might one antispyware program catch this, however, another will not. Is there a difference in types of spyware programs?

 Tags:

   Report

5 ANSWERS


  1. well bud first down load peer guardian it will block all the known bad Ip addresses they have listed-next down load comodo fire wall it will let you know of your in and out going - connections the 2 of those are free  BTW and very good - next do a little research on AV programs I like Nod32 just the antivirus and for god sakes carefull on what you install and always stay updated with microsoft -

    answered by the http://www.thechatspot.org/


  2. Hmmm...Your questions is quite tricky...For the why one antispyware program might catch this,another will not.It all actually depends on what anti-malware programs you use.If you use a infamous anti-malware scanner,you will normally found out that it does not work too well as the virus database is too small.

    Spyware programs has a lot of types.One tracks your shopping or internet usage information and send it back to third party companies,some promise you free p**n but actually dials to p**n site,causing a bomb of your phone bill at the end of the month,some downloads rogue anti-spyware programs(programs that need you to buy the full version to remove imaginery malwares),keyloggers,etc.

  3. Keylogger - spyware.

    No Antispyware program works 100% therefore use a layer approach to spyware - that's to say use more than one Antispyware program, this is safe & recommended.

  4. Anytime you download anything your risk getting a virus. Actually extremely sophisticated viruses can get into your system so long as your connected to the internet (though this is unlikely). I would recommend super anti spyware (I know it sounds and looks really fake but it works).

  5. Normally, someone enters a disk into your computer and then they get a website that lists.so ething and pressed "allow" this company  to install whatever, i.e. an active x thing.  

Question Stats

Latest activity: earlier.
This question has 5 answers.

BECOME A GUIDE

Share your knowledge and help people by answering questions.