The July 18 ABC newscast had a feature on keyloggers, a clear threat to computer security: “At least a third of online crimes can now be traced to keylogging.” What’s particularly frightening is the availability of such “stealth” programs, as illustrated in a Google search. Common sense suggestions are given at the end of the article. Nevertheless, something else to be concerned about.
![]() |
There are isolated problems with current patches, but they are well-known and documented on this site. |
SIGN IN | Not a member? | REGISTER | PLUS MEMBERSHIP |
-
Keylogger
Home » Forums » Cyber Security Information and Advisories » Code Red – Security/Privacy advisories » Keylogger
- This topic has 29 replies, 14 voices, and was last updated 19 years, 9 months ago.
Viewing 1 reply threadAuthorReplies-
WSjscher2000
AskWoody LoungerJuly 19, 2005 at 7:17 pm #960795(Edited by jscher2000 on 19-Jul-05 13:17. )
In addition to the suggestions in the article (referenced in post 500,749), you can foil many simple keyloggers by inserting non-keyboard navigation into your key stream. Example:
If your password were DesperateHousehusband you might type and mouse as follows: House {appears as *****} click at the beginning of ***** Desperate click at the very end (might need to select across with the mouse, but don't press End) husband
I do this when using public computers to access secure sites.
Notes: Follow-on posts and General Paranoia inspire the following additional comments
-
WSLeif
AskWoody Lounger -
WSAlanMiller
AskWoody Lounger -
WSHansV
AskWoody LoungerJuly 19, 2005 at 11:18 am #960857To take Jefferson’s example: you start by typing House.
Click at the beginning, then type Desperate.
If the password box is narrow, this may have pushed the end of the word House beyond the right edge of the box, so you cannot click after House at this moment
You should NOT press End to get to the end since this would be detected by the Key Logger.
Instead, drag the mouse across the password to the right until the word House scrolls into view, then click after the word. -
WSAlanMiller
AskWoody Lounger
-
-
-
-
WSNYIntensity
AskWoody Lounger -
WSjscher2000
AskWoody Lounger -
SteveTetch
AskWoody PlusJuly 20, 2005 at 9:04 am #961096I don’t tend to use public computers. On my PC I have the references and passwords I need in an encrypted Word document, compiled while offline. Then, if I want to enter a secure site, I open the encrypted document and cut-and-paste the User ID and password. This also encourages me to choose passwords I may not readilly remember, (i.e. random combinations of letters, numbers and, if the site allows then, punctuation characters), thus making the thing harder to crack.
Am I fooling myself that this is in any way more secure than filling in the fields in the normal way,? The name “keylogger” suggests that, in my circumstance, the only key sequence they’ll capture is “Ctrl-V”.
-
WSAlanMiller
AskWoody LoungerJuly 20, 2005 at 10:40 am #961107Slightly off the track here, but I have read some concerns relating to password managers being used in conjunction with clipboard extenders; namely the indefinite retention of the password “somewhere” on the system. Some such managers do things like clearing the clipboard X seconds after the password is copied, but I don’t think there’s any way for them to override a running clipboard extender.
Alan
-
WSHoward Kaikow
AskWoody Lounger -
WSAlanMiller
AskWoody Lounger -
joep517
AskWoody MVP -
WSAlanMiller
AskWoody LoungerJuly 20, 2005 at 12:46 pm #961140But for a clipboard extender utility (like Yankee Clipper), clips are stored between reboots too.
Alan
-
WSjscher2000
AskWoody Lounger -
WSBerylM
AskWoody LoungerAugust 11, 2005 at 10:52 am #965767Just out of curiosity, if the keylogger had access to the machine (which obviously he does, since he’s recording the keystrokes performed on it) would the log not record the opening of the document, selecting, and copying as well as the pasting of the password?
Okay as long as you do it using the mouse, presumably, but not if you use keypresses to get to it …?
-
WSHansV
AskWoody Lounger -
WSBerylM
AskWoody LoungerAugust 11, 2005 at 12:28 pm #965803Yes, but my point was that if the keyboard was used to open the document (to which the keylogger has access) the keypresses used to open it would be recorded and the logger would then be able to repeat the process – opening the correct document and highlighting the word which is the password?
-
WSHansV
AskWoody Lounger -
WSAlanMiller
AskWoody LoungerAugust 11, 2005 at 2:52 pm #965835I guess it depends on whether we’re still talking basic key loggers, or have drifted across to more sophistocated backdoors/ trojans, like Sub Seven. This Trojan Horse Demo page shows quite a frightening inventory of the capabilities of such malware.
Alan
-
WSStuartR
AskWoody Lounger
-
-
-
WSkiazd
AskWoody LoungerAugust 18, 2005 at 6:24 pm #967322I find this interesting, but I am not sure why it works. If you type in House the key logger picks up the keys. When you click in front of the word and then type Desperate, the key logger picks this up. What exactly would be recorded on the key logger? Doesn’t it have House and Desperate or even DesperateHouse, or does the non keyboard movement of the cursor ‘confuses’ the logger in some way?
-
WSHansV
AskWoody Lounger -
WSjscher2000
AskWoody LoungerAugust 18, 2005 at 6:54 pm #967340The best choice would be to type what appears to be a correct phrase but which you typed out of order. If the example had been HouseDesperateHusband, typing Desperate first, then House, then Husband, it would have made more sense and the spy probably would not pick up the deception.
I should add: after using a lot of public computers, it is a good idea to change your password!
WSj2callie
AskWoody LoungerAugust 15, 2005 at 3:24 am #966395(Edited by charlotte on 14-Aug-05 21:24. to activate link)
This is from the Trojan Horse Demo by Hacker Eliminator, at:
http://tinyurl.com/8yl5f%5B/url%5D
“In testing we have tried several other firewall programs and ran the SubSeven server without raising any alarm whatsoever. The reason is that SubSeven will open a port on the computer as soon as it starts up ready and listening for the hacker to connect. As the port is already open when the standard firewall opens, it simply trusts it and ignores the Trojan.”
Sooo, does this mean that my firewall (ZA) is NOT protecting me from outbound requests?
-
WSAlanMiller
AskWoody LoungerAugust 15, 2005 at 12:03 am #966399I’m presuming your post was intended as a reply to me, not DenGar.
It may very well be possible that ZA could be “tricked” into thinking that SubSeven is just running a “business as usual” port communication. The moral here being not to put your trust in a single (type of) anti-malware program. Most AV programs will detect and remove this malware – see here for example.
Alan
-
WSj2callie
AskWoody LoungerAugust 15, 2005 at 5:17 am #966403Edited by HansV to correct URL (it contained http: twice)
Thanks Alan, yes I was trying to reply to your message (as I am to this last one, but I can’t see anywhere how to quote??).
That’s a nice article from McAfee, thanks, but of course with all that technical talk I’m not sure I’m not more confused.
For instance in the Method of Infection section, I have a bunch of security software installed (see my post at Wilder’s with all the various programs I’m running http://www.wilderssecurity.com/showthread/?t=93257%5B/url%5D ) and some of these methods seem to be ones I’m protected against by them. I’m hoping I have layers of protection.
The more you know the more you know you don’t know.
Callie
-
WSAlanMiller
AskWoody LoungerAugust 15, 2005 at 4:38 am #966407Callie,
Although I’m no expert in the area, it sounds like you’re doing pretty much everything “right”, as also indicated in the replies you had at Wilders. As somebody there also noted, there’s no specific “right” way to go; the general idea being to cover all the bases you can, with trusted and up-to-date software. More important than anything else (IMO) is to be consciously aware of what nasties are out there and how they might get onto your system in the first place… and “compute” accordingly. Also, if they do manage to penetrate your software defences and your safe surfing, what’s available to detect their presence (either as active processes or dormant files) and clean them out.
Sounds like you’re on the right track with all of these aspects. You’ll find lots of posts in this forum, recommending various “suites” of defences, similar to what you already use. All I can add is, like the
s say, be careful out there.
Alan
-
Jisp
AskWoody LoungerAugust 23, 2005 at 2:04 pm #968219Have read this topic with much interest and it brings to mind something I read many years ago. In IE, navigating to Internet Options/Security/Custom Level, and scrolling down is a button marked ‘Allow Paste Operations Via Script’. My understanding of this is that this enables internet sites and appplications with internet access to literally grab clipboard contents via a paste script if they desire. I guess I class this as a form of keylogging if ‘Enabled’. Can anyone confirm if this is correct and if it is, may be something to check on one’s machine.
-
WSjscher2000
AskWoody LoungerAugust 23, 2005 at 2:40 pm #968237If I recall correctly, you can set that to “prompt.” Over the course of a few years, the only prompts I received were when I inserted pictures into HTML messages in Outlook. So this seems to be a little used feature that could be disabled without much loss of functionality. As for what malicious uses it might permit, I haven’t read up on it.
-
-
-
Viewing 1 reply thread -

Plus Membership
Donations from Plus members keep this site going. You can identify the people who support AskWoody by the Plus badge on their avatars.
AskWoody Plus members not only get access to all of the contents of this site -- including Susan Bradley's frequently updated Patch Watch listing -- they also receive weekly AskWoody Plus Newsletters (formerly Windows Secrets Newsletter) and AskWoody Plus Alerts, emails when there are important breaking developments.
Get Plus!
Welcome to our unique respite from the madness.
It's easy to post questions about Windows 11, Windows 10, Win8.1, Win7, Surface, Office, or browse through our Forums. Post anonymously or register for greater privileges. Keep it civil, please: Decorous Lounge rules strictly enforced. Questions? Contact Customer Support.
Search Newsletters
Search Forums
View the Forum
Search for Topics
Recent Topics
-
Windows hosting exposes additional bugs
by
Susan Bradley
1 hour, 38 minutes ago -
No more rounded corners??
by
CWBillow
4 hours, 3 minutes ago -
Android 15 and IPV6
by
Win7and10
2 hours, 43 minutes ago -
KB5058405 might fail to install with recovery error 0xc0000098 in ACPI.sys
by
Susan Bradley
13 hours, 59 minutes ago -
T-Mobile’s T-Life App has a “Screen Recording Tool” Turned on
by
Alex5723
16 hours, 40 minutes ago -
Windows 11 Insider Preview Build 26100.4202 (24H2) released to Release Preview
by
joep517
11 hours, 15 minutes ago -
Windows Update orchestration platform to update all software
by
Alex5723
1 day ago -
May preview updates
by
Susan Bradley
11 hours, 23 minutes ago -
Microsoft releases KB5061977 Windows 11 24H2, Server 2025 emergency out of band
by
Alex5723
2 hours, 58 minutes ago -
Just got this pop-up page while browsing
by
Alex5723
16 hours, 11 minutes ago -
KB5058379 / KB 5061768 Failures
by
crown
13 hours, 16 minutes ago -
Windows 10 23H2 Good to Update to ?
by
jkitc
2 hours, 35 minutes ago -
At last – installation of 24H2
by
Botswana12
1 day, 15 hours ago -
MS-DEFCON 4: As good as it gets
by
Susan Bradley
2 hours, 34 minutes ago -
RyTuneX optimize Windows 10/11 tool
by
Alex5723
2 days, 3 hours ago -
Can I just update from Win11 22H2 to 23H2?
by
Dave Easley
2 hours, 9 minutes ago -
Limited account permission error related to Windows Update
by
gtd12345
2 days, 17 hours ago -
Another test post
by
gtd12345
2 days, 17 hours ago -
Connect to someone else computer
by
wadeer
2 days, 11 hours ago -
Limit on User names?
by
CWBillow
2 days, 15 hours ago -
Choose the right apps for traveling
by
Peter Deegan
2 days, 4 hours ago -
BitLocker rears its head
by
Susan Bradley
1 day, 12 hours ago -
Who are you? (2025 edition)
by
Will Fastie
1 day, 11 hours ago -
AskWoody at the computer museum, round two
by
Will Fastie
2 days, 7 hours ago -
A smarter, simpler Firefox address bar
by
Alex5723
3 days, 3 hours ago -
Woody
by
Scott
3 days, 13 hours ago -
24H2 has suppressed my favoured spider
by
Davidhs
1 day, 12 hours ago -
GeForce RTX 5060 in certain motherboards could experience blank screens
by
Alex5723
4 days, 3 hours ago -
MS Office 365 Home on MAC
by
MickIver
3 days, 21 hours ago -
Google’s Veo3 video generator. Before you ask: yes, everything is AI here
by
Alex5723
4 days, 17 hours ago
Recent blog posts
Key Links
Want to Advertise in the free newsletter? How about a gift subscription in honor of a birthday? Send an email to sb@askwoody.com to ask how.
Mastodon profile for DefConPatch
Mastodon profile for AskWoody
Home • About • FAQ • Posts & Privacy • Forums • My Account
Register • Free Newsletter • Plus Membership • Gift Certificates • MS-DEFCON Alerts
Copyright ©2004-2025 by AskWoody Tech LLC. All Rights Reserved.