1. Advertising
    y u no do it?

    Advertising (learn more)

    Advertise virtually anything here, with CPM banner ads, CPM email ads and CPC contextual links. You can target relevant areas of the site and show ads based on geographical location of the user if you wish.

    Starts at just $1 per CPM or $0.10 per CPC.

Hacker on a machine, but how?

Discussion in 'General Chat' started by SpeakToMe, Oct 27, 2011.

  1. #1
    A hacker has supposedly been on my wife's machine, capturing her keystrokes. Bastid managed to pull $65k out of her brokerage account, although it was caught over in Australia and returned. Never would have believed it, but AOL senior guy assures me that someone must have access to her keystrokes. I have taken her machine offline, bought her a new one, and I now want to find out how the heck this fraud was perpetrated. Can anyone recommend a way to identify the program that was inserted?
     
    SpeakToMe, Oct 27, 2011 IP
  2. adityastar

    adityastar Active Member

    Messages:
    164
    Likes Received:
    1
    Best Answers:
    0
    Trophy Points:
    55
    #2
    it was keylogger and it can be inserted when any infected program was installed on your wife's system. A good antivirus may protect you but still there are hundreds of new keyloggers and viruses are being made, so you can't be hundred percent safe. Only safe way is not to download any software from net or install any pirated software as they mostly contain keyloggers.
     
    adityastar, Oct 27, 2011 IP
  3. Wincrew

    Wincrew Banned

    Messages:
    155
    Likes Received:
    9
    Best Answers:
    0
    Trophy Points:
    100
    #3
    Get it to the police.
     
    Wincrew, Oct 27, 2011 IP
  4. keeppc

    keeppc Member

    Messages:
    5
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    36
    #4
    There are some free keyloggers can be downloaded, may be you got one on your computer
     
    keeppc, Oct 28, 2011 IP
  5. The Webby

    The Webby Peon

    Messages:
    1,852
    Likes Received:
    30
    Best Answers:
    1
    Trophy Points:
    0
    #5
    Tell your wife to not to trust strangers on Internet, not to download any software, image, music or video from untrustworthy source and to stay away from sneaky websites..

    Hackers exploit many ways to gain access of your computer.. Mostly via a webpage that uses multiple exploits/java applet to download and install keyloggers and/or RAT on victims computer..
     
    The Webby, Oct 28, 2011 IP
  6. neo127

    neo127 Active Member

    Messages:
    313
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    53
    #6
    Also be aware of spam mails. Some people also attach these key-loggers in emails so also be careful with them too. IMO just buy a premium edition of a good AV so you can get rid of all these potential threats.
     
    neo127, Oct 29, 2011 IP
  7. angelinasharma

    angelinasharma Peon

    Messages:
    125
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    0
    #7
    Be careful of spam mails. Some people also attach these key-loggers in emails so also be careful with them too
     
    angelinasharma, Oct 29, 2011 IP
  8. Br4v0

    Br4v0 Member

    Messages:
    29
    Likes Received:
    0
    Best Answers:
    0
    Trophy Points:
    36
    #8
    lull you are . you dont need to get machine offline . just go get a good antivirus :p
     
    Br4v0, Oct 29, 2011 IP
  9. Icecube_media

    Icecube_media Peon

    Messages:
    656
    Likes Received:
    3
    Best Answers:
    0
    Trophy Points:
    0
    #9
    hi
    change operating system windows operating systems are very venerable, hackers can easily penetrate in your system, by softwares or by open ports, use Linux for better security ..
     
    Icecube_media, Oct 29, 2011 IP
  10. bluemouse2

    bluemouse2 Well-Known Member

    Messages:
    4,055
    Likes Received:
    130
    Best Answers:
    0
    Trophy Points:
    185
    #10
    always use an antivirus on your machine!
     
    bluemouse2, Oct 29, 2011 IP