Skip to main content

All Questions

Tagged with
5 votes
3 answers
1k views

Can a website keylog you outside a virtual machine

I came across a suspicious website called keylog.me (you can already tell from the name). I was as curious as heck to find out what it does, so I got on a VM (Fedora Linux which I reinstalled later) ...
somebody6000's user avatar
0 votes
2 answers
2k views

Refurbished laptop computer - any advice?

I just recently bought a refurbished laptop. I have seen stories of refurbished phones being sold with spyware, trojans etc installed on them. My question is, what steps should I take (outside of ...
DBroncos1558's user avatar
1 vote
1 answer
20k views

Writing keylogger and viruses in python [closed]

So recently I have been working on some projects one of them is keylogger and the second is SYNflood (both in python). I want to know if ,is it a good practice to use python language for such purposes?...
Yakov Mor's user avatar
6 votes
4 answers
1k views

How to keep Mac secure from viruses, malware and keyloggers?

How can I download and install software and make sure that it is not infected with viruses, malware or a keylogger? Also, I heard that Macs "don't get viruses". Is this true? Is it a good practice to ...
B Seven's user avatar
  • 433
2 votes
2 answers
2k views

keylogger detection by listening network

It is known that malware often uses keyloggers. Also some viruses aren't detected by antiviruses, therefore some viruses, especially APTs could stay in a system for so long without any detection. What ...
smttsp's user avatar
  • 366
5 votes
6 answers
2k views

How can a novice find proof of a system compromise?

I am almost certain a colleague has installed a keylogger on my system. I am totally new to IT security, but have substantial linux / windows / programming experience. The system I believe is ...
Allen Watsdal's user avatar
7 votes
2 answers
589 views

Statistics on purposes of viruses/malware

Are there any resources that analyze the purpose or goal or the major viruses/malware out in the wild today? For example, what percentage are used to construct botnets (for DDoS or something else)? ...
jrdioko's user avatar
  • 13.2k