Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Spyware, Key Logger: Exoprience, Expertise Requested
Self ^ | July 31, 2015 | Histage

Posted on 07/31/2015 8:02:12 PM PDT by Hostage

A neighbor's estranged Ex has possibly installed spyware and a key logger onto a new notebook given as a 'gift' to both neighbor and teenage daughter.

The neighbor is the custodial parent of the one teenage daughter who recently received the new 'spy loaded' notebook computer from her estranged parent. The notebook runs Win 8.1 and is to be eventually upgraded to Windows 10. The teenager was told directly by the estranged parent that everything the custodial parent does could be seen and recorded and then messaged out clandestinely.

The neighbor would like to know the following:

1. How to detect if spyware and key logging is really taking place on the computer?

2. If spyware/key logging is detected, how to get rid of it for sure and can it be traced back to the Ex?

3. The notebook accesses the internet through a hotspot encrypted modem. Is there any danger that the encryption key to the wifi modem has been captured?

4. Should the OS be reinstalled to be sure the spyware is flushed out? How to know for sure and how to prevent it coming back?


TOPICS: Chit/Chat; Computers/Internet; Miscellaneous
KEYWORDS: computer; computing; keylogger; spyware
Navigation: use the links below to view more comments.
first previous 1-2021-33 last
To: Hostage

First thing I do on a new machine is create rescue disks. Put them away in a zip lock. My HP needs four disks.

When the inevitable clown gets his malware on board telling me to purchase some malware prevention software every 30 seconds, and prevents the system restore point to an earlier time, and prevents branded malware programs; I just pull out the rescue disks and go for it. Then restore music and photos.

The whole thing takes hours. I would love to destroy the property and the people who put this stuff out there, causing expense of millions of dollars of resources to avert damage.


21 posted on 07/31/2015 9:58:08 PM PDT by cicero2k
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hostage

Get Rid of Windows. It’s spyware central. Has more holes than a sieve. If I wanted to own someone with a windows machine, i could even do it remotely by sending them an email they opened, or 1000 other hacks.

Try a friendly linux distro.


22 posted on 07/31/2015 10:14:38 PM PDT by BereanBrain
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hostage

http://www.softwareok.com/?seite=faq-Windows-8&faq=85


23 posted on 07/31/2015 10:26:07 PM PDT by jsanders2001
[ Post Reply | Private Reply | To 12 | View Replies]

To: Hostage

http://www.softwareok.com/?seite=faq-Windows-8&faq=85


24 posted on 07/31/2015 10:26:07 PM PDT by jsanders2001
[ Post Reply | Private Reply | To 12 | View Replies]

To: Hostage

I agree with posters saying re-install the operation system.


25 posted on 07/31/2015 10:54:17 PM PDT by ChinaGotTheGoodsOnClinton (Go Egypt on 0bama)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hostage

DO NOT DESTROY THE DRIVE, should you replace. It is the evidence of any willful tampering.

1 Image the drive (I.e., Ghost)
2 Install/recover original factory install. It will not include software added after the factory. It is safe.
3 Assess your access to folks with some forensic skills, especially virtual machines. They can load the image to evaluate what *might* have been installed.

Most importantly, document every step thoroughly. Actions such as an attempt as spying are prosecutable. All assistance in the evaluation must meet legal requirements. Enlist the aid of your friend’s attorney and their contacts with law enforcement.

Make every step clean and documented. When complete, turn everything over to the lawyer. Do not discuss with anyone not involved swith the process.

Your actions will be picked over to find errors.

Good luck.


26 posted on 08/01/2015 12:08:10 AM PDT by LoneStar42
[ Post Reply | Private Reply | To 1 | View Replies]

To: Hostage

First of all, never trust anything on the machine. No way to be sure 100%.

Secondly, he’s nearly certainly breaking eavesdropping laws.

I’d turn him and the machines in to the police. I’d also arm myself to the teeth because crazy, vindictive people are crazy and vindictive.


27 posted on 08/01/2015 12:16:55 AM PDT by mountainbunny (Faithless is he that says farewell when the road darkens ~ JR.R. Tolkien)
[ Post Reply | Private Reply | To 1 | View Replies]

To: dinodino
That will not be sufficient. Remove the hard drive, trash it, and install a new one with a fresh Windows install.

And while you're at it, drain your car battery and rinse it out several times, then fill it up with distilled water.....don't forget to check the muffler bearings and replace the stale air in the tires with fresh, bouncy air.

28 posted on 08/01/2015 4:14:13 AM PDT by trebb (Where in the the hell has my country gone?)
[ Post Reply | Private Reply | To 2 | View Replies]

To: trebb

My advice was serious. The OP could have a rootkit and does not have the knowledge to remove it. In fact, there are now malware that install to the flash on the HDD itself. Since hard drives are dirt cheap, better to just start fresh and junk the old one.


29 posted on 08/01/2015 4:54:41 AM PDT by dinodino
[ Post Reply | Private Reply | To 28 | View Replies]

To: dinodino
There are cheaper ways to sanitize the HD than throw it out before loading a new OS - you can use a write-locked boot CD wiht a format app that can overwrite multiple passes, etc. Besides what you and I consider to be dirt cheap may not be so affordable to everyone.

Your way would definitely be effective though.

30 posted on 08/01/2015 7:27:45 AM PDT by trebb (Where in the the hell has my country gone?)
[ Post Reply | Private Reply | To 29 | View Replies]

To: trebb

What you describe will not render the drive safe if its firmware has been modified. The safest approach is to crush the old drive.


31 posted on 08/01/2015 7:58:06 AM PDT by dinodino
[ Post Reply | Private Reply | To 30 | View Replies]

To: dinodino

Safer, but not the safest.


32 posted on 08/01/2015 8:30:38 AM PDT by Henry Hnyellar
[ Post Reply | Private Reply | To 31 | View Replies]

To: Henry Hnyellar

The safest is simply to not use Windows and not use that computer.


33 posted on 08/01/2015 8:59:48 AM PDT by dinodino
[ Post Reply | Private Reply | To 32 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-33 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson