Jump to content

Recommended Posts

Posted
Just wondering about the capabilities of modern nerds. Are there viruses that can give someone access to your computer to monitor key strokes and also listen in on phone conversations?

Smart men learn from their own mistakes; Wise men learn from others. ;)

 

I refuse to engage in a battle of wits with an unarmed man.:rolleyes:

  • Replies 16
  • Created
  • Last Reply

Top Posters In This Topic

Posted

Not just viruses, even some anti-cheating measures on video games have that same ability.

 

Take World Of Warcraft for example, they have a system called "Warden" that can look at every part of your system and report what it finds. The idea is that cheaters can write their hacking software to look like anything so to stop game hackers, they need access to everything on your computer.

 

The TOS and EULA you agree to at the time of installing the software and you again do it on each patch gives Blizzard entertainment full rights to complete access to everything on your computer.

 

 

Now, you may ask what stops them from using this in bad ways?

 

Nothing but their integrity, oh and the integrity of every employee involved in that section of the company controlling Warden. The thing that makes Warden special is it is like a robot waiting for orders on what to look at, the orders can change from one second to the next so there is no real way to know what information is being gathered from your computer and sent back to Blizzard.

 

 

Data miners have been out for a long time that collect and sell information on things like browsing history and other things to try and help sell more things to the public, well this is certainly capable of that kind of thing without anyone knowing.

 

 

 

 

I guess my point on this is we not only have to be careful about the unknown viruses we might get on our computers but also we should be paying more attention to the malware/viruses/data miners, we intentionally install on our computers.

Posted
I wiped out my Windows and put on Linux. It's pretty plain Jane but is not supposed to get virus. I freaked out and swtiched back. It took about an hour to put Linux and get the printer and internet working. It took about a day and a half to re-install Windows, get the drivers for everything, do the updates and re-install my virus protecter AVAST. During this time thank god the old version of AVAST detecteted and Skype major virus trying to load it's self while this prosses was going on. I'm back and running in Windows but I wonder if I shouldn't have just stuck with Linux. The problem I had with Linux was it wasn't comatible with my external drive which has everything on it. The other was I wasn't able to share the printer. A friend of mine that swears by Linux said I could'a got an imulator for the drive and he thinks I coulda found a way to share the printer but I'm an old dog. :p

"You can't stop insane people from doing insane things by passing insane laws. That's just insane!" Penn & Teller

 

NEVER FORGOTTEN

Posted

Here is the issue....

 

My Bro has a cyber stalker and thinks she may have done something to his computer. He thinks maybe it was when he clicked on her picture to see who she was. She started posting comments about stuff he had in his computer/thumbdrive files, then about stuff in ims and emails, then about stuff in phone conversations with his friends...the phone has a lot of background static now, too. I was thinking maybe he was being paranoid.

 

Is there anything he can do to reverse this? Is there anything he can do to find out who she is?

Smart men learn from their own mistakes; Wise men learn from others. ;)

 

I refuse to engage in a battle of wits with an unarmed man.:rolleyes:

Posted
Here is the issue....

 

My Bro has a cyber stalker and thinks she may have done something to his computer. He thinks maybe it was when he clicked on her picture to see who she was. She started posting comments about stuff he had in his computer/thumbdrive files, then about stuff in ims and emails, then about stuff in phone conversations with his friends...the phone has a lot of background static now, too. I was thinking maybe he was being paranoid.

 

Is there anything he can do to reverse this? Is there anything he can do to find out who she is?

 

She's gotta be pretty damn good to pull that off. If she has a key logger on his cp it would be hard to detect and usally you need to be on the computer to install one. He could call his service provider but I would personally do a complete factory re-install after he contacts them. That would get rid of the key logger. Next he should change his passwords. I would report her anyway just for the threat of breaking into his cp and they might be able to find something out. As far as the phone is concerned I don't see her being able to reference anything on that unless she has people she knows at the phone company that would risk their job and jail time.

"You can't stop insane people from doing insane things by passing insane laws. That's just insane!" Penn & Teller

 

NEVER FORGOTTEN

Posted

There are certainly people out there capable of this and I know a few very well. I have been involved in the video game hacker world for a lot of years and have been talking to them on messenger and they would take over my computer while we were talking just to screw with me.

 

You can find a lot of those guys hanging out at 4chan and other places who like to cause trouble or even just do stuff for the challenge.

 

If you have one of those guys on your back, you need to change everything, I would drop off the internet for at least a short time, change isp, and change email addresses/messenger accounts. Change bank accounts, everything.

 

 

One of those guys can really cause a lot of problems.

 

 

 

 

But, she can also be bluffing.

 

 

Reformatting his computer and such is a reasonable first action but if she shows back up and is still seeming to know things she should not know then it is time to take it seriously and change everything.

Posted
Yeah TJ if your playing a game you're cp's are in direct connect comunitcation and thus they could get in by that. If he clicked on something it would have to install a key logger program such as Jazzos ( I think that was the name of it). A fresh re-install would get rid of it. But then like you said if she has made note of his paswords and accounts he would have to change those after the re- install.

"You can't stop insane people from doing insane things by passing insane laws. That's just insane!" Penn & Teller

 

NEVER FORGOTTEN

Posted
Also having your firewall up and a good anitvius such as AVAST would've detected the attempt for a key logger to be installed.

"You can't stop insane people from doing insane things by passing insane laws. That's just insane!" Penn & Teller

 

NEVER FORGOTTEN

Posted

That's pretty creepy is someone can do that and is doing that. Although I gotta admit it's kinda hot someone can be that intelligent to pull all that of! Intelligence is a turn on for me...

 

Although people shouldn't use their powers for evil:D

Posted
Yeah TJ if your playing a game you're cp's are in direct connect comunitcation and thus they could get in by that. If he clicked on something it would have to install a key logger program such as Jazzos ( I think that was the name of it). A fresh re-install would get rid of it. But then like you said if she has made note of his paswords and accounts he would have to change those after the re- install.

 

 

Some of these guys can get past any firewall like snapping their fingers Snaf, I have tested them on my work computers where they get past the hardware firewalls, past the server, and to an individual station and take it over as if you gave them a remote desktop.

 

You can't stop these guys if they really want in, but usually they don't pick on normal people, you usually need to do something to piss them off or you pose a challenge in some way. I actually had to get the help of another hacker to talk to a guy who turned one of my computers into a robot spammer for the purpose of ddos attacks, he was supposed to be a "friend" of mine but he also knew I had a home network with several computers so he took the liberty of "borrowing" one of them for his attacks.

 

He told me later there was nothing personal and we are "friends" today.....but he saw nothing wrong with what he did either, they just don't see the world the way most people do, right/wrong has a lot of blurred lines involved with them.

 

 

Scary guys really.

Posted

is the phone a land line? or a cell phone?

 

Is he using Vonage or some other cpomputer based phone service? I'm no pro at this by any means, but I don't see how she could tap into his cell phone or other land line unless it is somehow thru the computer (unless she is just listening in thru the webcam or something.)

I'm trusted by more women.
Posted

It's a land line, but it is one of those where the dsl is through the phone company. I don't know if that would make a difference. Supposedly she has some kind of computer degree and is completely whacked out. She thought he was someone else when he started posting on the board. An ex of hers I think. That is why she started messing with him. She is paranoid and thinks people are watching her.

He did have a weird text to his cell phone from an Ashley to a Bill about how ?the computer crashed and it is annoying but will be back online by tomorrow. Just have to re-upload everything.? He thought that was really odd when the girl mentioned that ?Ashley was looking for Bill because her computer crashed. Haha?

Smart men learn from their own mistakes; Wise men learn from others. ;)

 

I refuse to engage in a battle of wits with an unarmed man.:rolleyes:

Posted
Apparently, he found two worms and a Trojan on the computer. My anti-virus picked up an attempted Trojan install on my computer. Can you tell me anything about those?

Smart men learn from their own mistakes; Wise men learn from others. ;)

 

I refuse to engage in a battle of wits with an unarmed man.:rolleyes:

Posted
Apparently, he found two worms and a Trojan on the computer. My anti-virus picked up an attempted Trojan install on my computer. Can you tell me anything about those?

 

They happen all the time. If your anti-virus caught it then you should be OK. Most ant-virus programs will ask you if you want to put in in a chest or save it. Just go for the Delete option. If your think your still infected you can use the system restore feature in the accessories folder. It looks like a calender so just pick a day or week before it happened and it will get rid of it. You won't lose anything unless you have just installed any programs to which you will need to re-install them.

"You can't stop insane people from doing insane things by passing insane laws. That's just insane!" Penn & Teller

 

NEVER FORGOTTEN

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.


×
×
  • Create New...