Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Privacy Security

Anti-Keylogging Recommendations? 179

BeeazleBub writes "A friend asked me about the best programs to detect and remove spyware/logging/monitoring software that might have been placed on her computer by a spouse. Since there are a plethora of good and bad programs out there, I thought I would ask the slashdot crew for their recommendations. What is simple, reliable and most effective? I'm sure some of you have had the same question or circumstance. (No, booting from a Linux CD is not an option for this user)."
This discussion has been archived. No new comments can be posted.

Anti-Keylogging Recommendations?

Comments Filter:
  • by inTheLoo ( 1255256 ) * on Sunday May 18, 2008 @01:51PM (#23454342) Journal

    It's a domestic dispute that no one wants to get into. The obvious solution, to own your computer with free software, is not an option. All that's left is to delve into the cesspool of Winblows "solutions" and other inappropriate technical answers to an environment of broken trust.

    • by Simon (S2) ( 600188 ) on Sunday May 18, 2008 @01:54PM (#23454386) Homepage
      I agree. There is no solution. There are hardware keyloggers, software keyloggers, the spouse could log all traffic to/from the machine or take a screenshot every now and then. There is no solution to this. Trust your spouse or grap your computer and lock it somewhere only you have the key to.
      • by powerlord ( 28156 ) on Sunday May 18, 2008 @02:03PM (#23454464) Journal

        Trust your spouse or grap your computer and lock it somewhere only you have the key to.


        Too true.

        Nowadays, if you need a "trusted" computer, think about getting a Mac Airbook that you can slip into a folder in a filing cabinet when not in use, or keep with you all the time.

        Using a laptop raises the hurdle for installing a hardware keylogger (they're usually just dongles that sit between the keyboard and the computer), and using OS X should raise the bar a bit to install malware (not that it doesn't exist, it just might be more difficult to find, and navigating in OS X will be more challenging for a user not use to it).

        Using a small footprint laptop (like the Air), means you can hide it "in plain site", or in a place you can ensure physical control over (although personal control trumps al others for security).

        Realize that unless you're using encrypted protocols to browse web sites or send/receive email, your traffic could still be intercepted on the network, but that again requires a more sophisticated user than the average "Spouse who installed a keylogger".
        • by Darkness404 ( 1287218 ) on Sunday May 18, 2008 @02:12PM (#23454542)
          But honestly, it seems like this isn't a real case. Because apparently you can't boot from a Linux Live-CD, which would make the most obvious answer of "reformat your drives with Windows" also obsolete. As for hardware keyloggers, most seem to be rather obvious if you just look at the back of your computer where the either USB or PS2 connectors for plugging in your keyboard are and if there is extra hardware there remove it. This situation is kinda like saying BASH/ZSH/CSH/Every other shell in the system has been rooted so you can't trust them but you also can't just create a new user, reinstall your *NIX OS or replace the binaries.
      • by NewbieProgrammerMan ( 558327 ) on Sunday May 18, 2008 @04:20PM (#23455452)
        Oh, there's a solution: the friend needs to uninstall their spouse.

        Honestly, if you're at the point in a relationship where you're spying on each other, it's time to just throw in the towel and find a partner you can trust.
        • Now that you're gone
          All that's left is a band of gold
          All that's left of the dreams I hold
          Is a band of gold
          And the dreams of what love could be
          If you were still here with me
  • by astrashe ( 7452 ) on Sunday May 18, 2008 @01:52PM (#23454352) Journal
    I'll bet there's a really interesting story behind this.

    Here's the answer. She's trying to solve a human problem with a technical solution. It won't work. If she has to use a suspect windows computer, there's no software that will guarantee it's clean. It can't be done.

    And if you can't trust the person you're married to, your main problems in life aren't computer problems.

    • by MBCook ( 132727 ) <foobarsoft@foobarsoft.com> on Sunday May 18, 2008 @02:01PM (#23454446) Homepage

      I agree. My first thought was "don't get involved."

      Even if you think the husband is a spouse-abusing homicidal maniac, don't do this. If there is evidence, turn him into the police. Otherwise stay out.

      She can google it. She can take it somewhere (like Best Buy, Circuit City, etc). I know their terrible, but hey. If they work things out, you are the guy who tried to help her get out of the marriage. That won't ender you to him. If things go farther, how do you think you'll be treated if there was a key-logger and your solution didn't work? If there is no key-logger and she is just reaching and scared and overwhelmed, then playing into that could make things worse (in the harder for them to get together and fix their marriage if possible sense).

      She can use another computer, reinstall Windows, whatever. Don't get in the middle of someone else's fight (unless it is to save their life or some such, in which case, again, call the police). I seriously doubt doing this will make your life easier in any way.

      Tell her to go to a private eye. Talk to a (better) divorce attorney. But tell her you don't want to get involved in this.

    • by Khaed ( 544779 ) on Sunday May 18, 2008 @02:05PM (#23454494)
      I agree, on all points. Anyone that suspicious either is nuts or has reason to be suspicious, and either way, they are in trouble.

      I'd like to know why "booting from a Linux CD" isn't an option, though. Even if she has to use Windows for something work related, if she's doing anything where she wants privacy, what's wrong with a LiveCD? You can use AIM and Firefox. A LiveCD and a thumbdrive she can hide for files would work pretty well for that, and she doesn't have to be that bright to do it.
    • by Idaho ( 12907 ) on Sunday May 18, 2008 @02:20PM (#23454592)

      Here's the answer. She's trying to solve a human problem with a technical solution. It won't work. If she has to use a suspect windows computer, there's no software that will guarantee it's clean. It can't be done.


      You are absolutely right, which pretty much ends this discussion right there.

      Normally I'd suggest to do a complete Windows reinstall (assuming you have to run Windows), or install Linux, but you can't trust a Linux machine either, if others have physical access to them (and they know what they're doing).

      In any case this is a completely moot point for the exact reasons you mentioned.

      Assuming the real (non-tech) problem at hand here cannot easily be addressed, I'd suggest maybe buying an Asus EEE PC (since they're not too expensive and relatively easy to carry with you all the time). In addition, buy an USB stick or SD-card, and only store your data on those. They will easily fit in your wallet. But yeah, buying new hardware to work around this problem does not sound like a real solution, to be frank.
  • Divorce. (Score:5, Insightful)

    by The Warlock ( 701535 ) on Sunday May 18, 2008 @02:02PM (#23454454)
    Only solution. Either the wife is spying on the guy, in which case she doesn't trust him, or the guy is baselessly convinced that his wife is spying on him, in which case he doesn't trust her. Either way, this relationship is doomed.
  • Divorce (Score:3, Insightful)

    by jps25 ( 1286898 ) on Sunday May 18, 2008 @02:05PM (#23454490)
    If trust in a relationship is gone and you have to play hide and seek, there's only one option left. Divorce.
  • Format disk (Score:4, Informative)

    by coldfarnorth ( 799174 ) on Sunday May 18, 2008 @02:05PM (#23454492)
    Format, Reinstall. That wipes software. Splurge and buy a new keyboard if you don't trust it. Do a quick look for suspicious looking hardware. That should handle the worst. Ah, and change the locks to the house. No point going to all the trouble is the Ex-Spouse has access to the machine.
    • by Darkness404 ( 1287218 ) on Sunday May 18, 2008 @02:21PM (#23454602)
      But if you can't use a Linux live-CD how are you going to format or reinstall? As both the Windows install CD and a Linux live-CD have just about the exact same method to boot. If one doesn't work the other one won't either (unless it is a case of the Linux CD doesn't have enough RAM but with DSL any computer made in the last like 10 years should work perfectly fine).
  • by Stradivarius ( 7490 ) on Sunday May 18, 2008 @02:06PM (#23454498)
    If I had any good recommendations for such tools, I'd give them, but I don't, so I'll try to help in another way. I'll pose some questions that hopefully your friend will be asking herself:

    1) Isn't this missing the forest for the trees? If a marriage is so lacking in trust that she thinks her spouse is spying on her, there's a problem. If her spouse actually did install such a thing, there is similarly a problem. This is a much greater problem than the software itself. If she wants to save the marriage, this is the sort of situation where a counselor or similar trusted third party could be very helpful.

    2) If the logger or other software is indeed there, what is she worried about him discovering? If she's just (rightfully) angry about the installation of this software, and trying to demonstrate a point by removing it, that's one thing. But if there actually is something she wants to hide, again this is a far bigger problem in the relationship than the software.

    Good luck to your friend. This sounds like a tough spot to be in.
  • No luck (Score:3, Insightful)

    by Peter H.S. ( 38077 ) on Sunday May 18, 2008 @02:07PM (#23454506) Homepage
    If booting of a Linux CD isn't an option because it is perceived as "too technical" no other tool can help (even booting from a clean media wouldn't help against physical keyloggers or sniffers).
    A small Asus EEE PC with a encrypted SSD, grub/bios password and hidden away may allow the person to communicate in secret with some measurement of security against non-technical opponents with limited resources, if the person is able to use some kind of SSL proxy so that the data can't be sniffed easily. Tempest attacks or even simple hidden cameras may spoil even that.

    So, get a divorce instead.

    --
    Regards
  • Simple (Score:5, Funny)

    by Bill, Shooter of Bul ( 629286 ) on Sunday May 18, 2008 @02:21PM (#23454600) Journal
    Just install a key logger of your own. Then you'll be able to see any access he's been making, including any to the keylogger he has installed.

    From my own experience, Tin foil hats are good, but access to the government computers to make sure they aren't after you is more comforting to me.

    Note to federal agents: I have not gained access to your computers. And you might want to change your desktop wallpaper, scantily clad women on a work computer is just begging for a lawsuit.
  • by Tuoqui ( 1091447 ) on Sunday May 18, 2008 @02:22PM (#23454620) Journal
    Although the least likely to happen is to check for hardware keyloggers first. They're in meatspace so it should be pretty damn easy to spot. Next would be booting from a Linux Live CD like Knoppix or something and using that instead of the potentially compromised computer.

    Lastly, the guy should divorce her. If she's spying on him its to find grounds for a divorce that will net her a nice chunk of change in the settlement. Probably saying something stupid like he's surfing porn (what guy doesnt?) is the same as cheating or some other bullshit that a judge might accept to throw the book at him and have him paying alimony for the rest of his life.
    • by FSWKU ( 551325 ) on Sunday May 18, 2008 @02:39PM (#23454744)
      If booting from a Live CD isn't an option (which was said even in the summary, do people not even read THAT anymore?), then she's going to have ZERO clue what a hardware keylogger looks like.

      Anyway, several people here have already stated the blindingly obvious, and I'll agree with it 100%. If things are to the point where this is even a question, then the marriage is doomed. She doesn't trust him to not spy on her, and if he IS spying, then he doesn't trust her. Communication Fail and Trust Fail built into one package.
  • Impossible (Score:3, Insightful)

    by Just Some Guy ( 3352 ) <kirk+slashdot@strauser.com> on Sunday May 18, 2008 @02:31PM (#23454686) Homepage Journal

    There's no way to be 100% certain that nothing's being logged. Possible data gathering points:

    • Software logger in the OS
    • Rootkit
    • Keyboard plugged into a hardware logger
    • Keyboard contains a hardware logger
    • Computer case contains a hardware logger
    • Linksys router is actually running Linux, using tcpdump to log outbound packets or forward them to another computer

    No, there is no software you can run that will tell you if you're being monitored, by virtue of the fact that such software is impossible.

    Have her get a cheap laptop - maybe an Eee PC - and configure OpenVPN to a friendly router. You're a geek, right? If you're serious about her privacy, make it happen.

    • Re:Impossible (Score:5, Informative)

      by caitriona81 ( 1032126 ) <sdaugherty.gmail@com> on Sunday May 18, 2008 @04:00PM (#23455316) Journal
      More possible data gathering points:
      • Previously compromised accounts (email/chat/google web history)
      • Email forwarding settings (yes this is overt, but how many users actually look at their forwarding rules)
      • Recoverable "deleted" files on disk
      • Browser plugins
      • Saved passwords - even if they are "encrypted" any encryption that allows the application to read the password lets someone else do so as well.
      Solutions to these additional threats:
      • Every time a compromise is suspected, change all passwords from a secure computer immediately.
      • Check forwarding rules, particularly to web-based email services.
      • Always use SSL/TLS encryption whenever they are available. Learn not to give passwords over unencrypted channels - this won't help you against a keylogger, but it will help you against sniffing.
      • Be aware that "deleting" files doesn't really delete them unless you use specialized tools
      Further protection against keyloggers.
      • Reformat.
      • Make your computer as tamper-evident as possible. Buy a UPS so that if the computer reboots, there will be a reason for it. Keep the computer turned on. Secure all accounts on the computer with a password. If it's Windows, encrypt the SAM database with a password that you have to enter at bootup. Remove your own administrator rights, and have a separate administrator account that you only use to install software. Use a BIOS password. Disable booting from anything other than the hard drive. Install physical locks on the case to prevent it from being opened. Epoxy over the screws on the keyboard (after you've bought a new one).
      • Use an alternative web browser.
      • Be careful about opening links and attachments in email. Learn about phishing, particularly the type of targeted phishing that can be attempted by someone with intimate knowledge of their target. (Don't trust the return address on mails in particular - many of the keyloggers out there get on via a trojan horse that you have to be tricked into running)
      • If any evidence of tampering is found, start over.
      • Learn about computer security. http://www.cert.org/homeusers/ [cert.org] is one of the best starting places for non-technical users. Even if you don't understand it all, you have a starting place to ask questions.
      • Remember, trust is the enemy of security. Look for it. Understand how it makes you vulnerable, and decide if the risks are acceptable or not. This mindset extends all the way from the bare metal up to the human being at the keyboard. You have to start to think that way to really be able to keep a computer secure.
  • by rwa2 ( 4391 ) * on Sunday May 18, 2008 @02:36PM (#23454718) Homepage Journal
    C'mon, this is Slashdot.

    Obviously you just modify your space bar and numlock LED drivers to perform all I/O in morse code.

    Then you type in and display bunch of misleading information to entrap the eavesdropper into doing something silly / stupid / illegal and nab 'em on it.

    As far as still being able to check your email and bank accounts and stuff without compromising your passwords, just set up some kind of password vault that uses biometric authentication or something so you never have to type in your actual login / password on the untrusted machine. You'd have to do the setup for the private key and all on a trusted system of course.
  • by Cruciform ( 42896 ) on Sunday May 18, 2008 @02:42PM (#23454764) Homepage
    Most people are assuming that the spouse resides in the same residence. If the spouse is already out of the house due to separation, and is possibly using spyware/hardware to collect information for blackmail or court, then there is the option of having someone over to purge the system and visually inspect it.
    Any networking hardware like routers that could be compromised would need to be replaced or reflashed. Since she doesn't have the capability of dealing with a boot CD, her only option is third party intervention or going to the library to use their computers.
    We're missing too much info...
    How tech savvy is the spouse? Does he still live there? What kind of network setup is being used? etc. etc.
  • by Daimanta ( 1140543 ) on Sunday May 18, 2008 @02:51PM (#23454848) Journal
    And deliver anything personally.

    And nuke the site from orbit. It's the only way to be sure.
  • by RiotingPacifist ( 1228016 ) on Sunday May 18, 2008 @02:52PM (#23454854)
    Install linux, next problem.

    On either system good virus scanner will keep you covered from 95% of keyloggers so your fine unless you married a geek, but if you married a geek you'd be running linux/bsd anyway (possibly with a custom filesystem)
  • A friend.... (Score:4, Insightful)

    by wbren ( 682133 ) on Sunday May 18, 2008 @02:53PM (#23454858) Homepage

    A friend asked me about...
    A friend... riiiiiight....
    • by TheRealMindChild ( 743925 ) on Sunday May 18, 2008 @05:25PM (#23455926) Homepage Journal
      It is definitely the stereotypical mislead, but I don't think it is of the context which you infer (meaning, I don't think the submitter is the friend). Let's take a closer look:

      A friend asked me about the best programs to detect and remove spyware/logging/monitoring software that might have been placed on her computer by a spouse.

      When trying to be vague, as this person is, the whole "on her computer by a spouse" is really too much information. Should we really care that it was the spouse? Isn't it equally relevant to replace "spouse" with "mail man", "nurse", "escaped gorilla"? So that can imply that since the submitter felt that the "spouse" part was important, when actually it isn't, that the relationship between the submitter and alleged friend/offender is probably more personal... like, the friend is cheating on the "spouse" with the submitter, and they have a feeling that the "spouse" knows.
  • by joe_cot ( 1011355 ) on Sunday May 18, 2008 @02:55PM (#23454870) Homepage

    For software keyloggers, you can use a tool like SpyBot [safer-networking.org] to try to find them -- however, I can't guarantee it'll find your specific keylogger, if there is one. There's probably better software at this point, but I haven't used Windows in years.

    Another option is to use Windows' built-in search, and search for files modified in the past couple days. If there's a keylogger, odds are its log files will show up. I've accidentally found a keylogger on a friend's computer this way.

    Another option is to use a liveCD for everything important. Pick up an Ubuntu LiveCD [ubuntu.com], and start into that when you need to do things that are suspect.

    Keep in mind, however, that you may instead have a hardware keylogger. You may have a dongle like this one [keykatcher.com], which plugs in between your computer and your keyboard. You could also have one built into your keyboard -- there are companies that sell keylogging keyboards [amecisco.com], and companies that will embed a keylogger into a keyboard -- either a specific model, or your own if you mail it to them. There could also be one built into the computer, but I don't know of any company that does that.

    Moral of the story: if you can't trust the security of your computer, don't use it for things you don't want someone else to see. It might be time for her to invest in a cheap laptop, such as an Eee PC [asus.com], and either do all her work on a connection he doesn't have access to, or over ssl connections or a VPN.

    However, like others have said, worrying about a keylogger from your spouse isn't exactly the sign of a trusting relationship. I assume your friend knows this, and this is a preamble to a separation or divorce. If it's not, I'd suggest your friend and her spouse seek marriage counseling. Good luck to her.

  • by florescent_beige ( 608235 ) on Sunday May 18, 2008 @03:24PM (#23455074) Journal
    Comes to /. for technical advice: good!

    Gets from /. relationship advice: o noes!!!!
  • by nick_davison ( 217681 ) on Sunday May 18, 2008 @03:39PM (#23455164)
    It's really easy to say "If the relationship's that broken, just divorce."

    It's also badly missing the realities.

    If there's that much paranoia, odds are one or both parties are moving towards divorce but know they need to do a bunch of things to either avoid getting screwed in the process (or, if they're malicious, screw the other side).

    From experience with friends going through divorce, you should really be doing a bunch of things before you turn the cold war hot:

    You should ensure there's money to pay for lawyers in accounts that can't suddenly turn up empty on you.

    You should ensure that any evidence of infidelity on their part is documented. Likewise, you should be making sure you've not left any trails on your part.

    You should be making sure you've got copies of things like the mortgage paperwork, house deeds, car titles, etc.

    You should be contacting a lawyer first, not after you've set things in motion.

    Many of these can be handle via the web/email. The last thing you want is the spouse you're leaving having logged conversations with your lawyer and having grabbed the passwords to all of your accounts so they gain privileged information after the split.

    So, rather than assuming "It's broken. Go for divorce." and setting them up for a world of hurt they're trying to minimize, how about we try answering the question instead?
    • by jafiwam ( 310805 ) on Sunday May 18, 2008 @06:41PM (#23456404) Homepage Journal
      Infidelity doesn't matter.

      The courts care about;

      - kids
      - assets
      - giving as much (of the two above) to women as possible

      Yeah, if you are thinking your marriage is rotten, there's good reason to get proof to motivate you to end it. But, photos of a spouse at a hotel mean exactly dick in divorce court. They might mean something for child custody, but that's about it.
  • Why do... (Score:4, Funny)

    by geekboy642 ( 799087 ) on Sunday May 18, 2008 @03:57PM (#23455284) Journal
    Why do these moronic ask slashdot questions always rule out the one useful answer in the very question?

    "A Linux live CD is not an option". Bullshit. You windows-swilling pansy, grow some balls and try Linux. It won't kill you, it won't make you gay, and it won't rape your dog. Are you terrified of being free from >99% of viruses/trojans/spyware/adware/rootkits? Is there some kind of Stockholm syndrome going on here? You LIKE it when windows beats you, don't you? You hide the bruises, that's why you always wear those sweaters.

    You sick, twisted fuck.
  • detecting malware .. (Score:3, Informative)

    by rs232 ( 849320 ) on Sunday May 18, 2008 @04:00PM (#23455318)
    Under Windows, there is no sure way of detecting malware once it's already installed, as it takes steps to hide itself.

    The only sure way is a clean install or re-imaging from a hidden partition at boot. Something that would be a pain to set up and probably wouldn't even work with the current incarnation of Windows.

    Your bet bet is to get your friend to install these Sysinternals [slashdot.org]">utilitys and see if they can detect the keylogger by its activity. Monitoring activity [wireshark.org] at the firewall is also a good place to detect suspicious activity.

    What is it about Windows that your friend absolutly needs to use. Are there alternatives [slashdot.org] out there.

    If you absolutly can't survive without Microsoft applications then why not use a version of Linux that comes with CrossOver [codeweavers.com], this allows Windows applications to run natively on Linux, without the the same level of malware threat. Eg, by clicking on an URL or opening an email attachment.
  • by pbhj ( 607776 ) on Sunday May 18, 2008 @04:45PM (#23455636) Homepage Journal
    If the problem is being spied on by their spouse then using a computer outside the home sounds the best option.

    I did a website for a women's aid group ("WA"), they wanted information about how to keep it hidden from an abusive partner that the women were in touch with WA. I did a review of what the national centers gave as advice, including details of removing history files and such. In the end I settled for the only method being to use a public computer (eg at a library).

    Someone else can spy on you for sure, but unless your partner works at the City IT center or for the library (or wherever) then it's not going to be your partner spying on you.

    If you _need_ to get out the house and contact someone and your being abused and can't - please call directory enquiries and contact your local Womens' Aid organisation. They can advise you, give you temporary accommodation in a safehouse, help you talk to the police, help you seek mediation; basically empower you to take back control of your situation.
  • by Skylinux ( 942824 ) on Sunday May 18, 2008 @05:41PM (#23456046) Homepage
    Since most of the posts are not answering your question at all, here are some programs which can help.

    I have been fixing Windows computers for over 10 years and can suggest the following programs from personal experience. There is no guarantee that they will find all keyloggers but they will detect the progs you find by using google.

    1) Spybot Search & Destroy (free) http://www.safer-networking.org/ [safer-networking.org]
        This is a spyware checker, cleaner. It will also find keyloggers and screen capturing software
    2) Antivir (free for personal use) http://www.free-av.com/ [free-av.com]
        This is an Antivirus / malware program which I have found to kick the shit out of Norton Antivirus (Personal + Corporate) and McAfee.
    3) Norton Antivirus 2008 (not free)
        This is another antivirus program, it is not as good as Antivir but it may contain different malware signatures then Antivir.
    4) Adaware (free) http://www.lavasoftusa.com/ [lavasoftusa.com]
        Like Spybot but less strict, I don't use it anymore but you should run it anyway.
    5) Windows Defender (free) http://www.microsoft.com/athome/security/spyware/software/default.mspx [microsoft.com]
        This one is made (purchased) by Microsoft and is actually quite good, I can highly recommend it to remove crap from a computer. This one is free and includes an "active shield"

    If you run suggestions 1,2,4 and 5 above you can assume that your computer is clean. To be sure format and reload.

    As for the rest, follow the advice above and end the relationship....
    • by pbhj ( 607776 ) on Monday May 19, 2008 @06:37AM (#23460380) Homepage Journal
      The questioner says she can't run a live-CD. I can only imagine that's a problem of her ability with computers; in which case installing, scanning, interpreting, then properly removing the software is probably going to be too onerous for her.

      He's going to know that she has scanned for spyware, it'll be in his keylogger info.

      IMHO the solution is to use a different computer that the spouse could not have accessed, eg at a library or cybercafe.

      If they wanted suggestions for combating keyloggers then they should have asked for that instead of couching the question in terms of spousal abuse.
    • by hacker ( 14635 ) <hacker@gnu-designs.com> on Monday May 19, 2008 @01:07PM (#23464246)

      All good points, except #2.

      Stay far, FAR away from Avira. Not only does it hang, seize up and fail to complete its own updates and scans, but it drags system resources down tenfold more than the other alternatives.

      It also requires the "questionable" use of quite a few daemons which don't seem to be necessary with the other free AV products (like ClamAV, AVG Free and so on).

  • by gweihir ( 88907 ) on Sunday May 18, 2008 @06:01PM (#23456176)
    Keyloggers are designed to hide. Hence, while non-experts may be able to get lucky with some, with others they will not stand a chance. Sorry.

    However the problem is different. In most juristiction, installing a keylogger is a criminal act. One that could well tip the balance in a divorce proceedings. (I expect divorce will be the next step here, as things cannot really work out anymore: One or both partners are paranoid, and there is no trust left.) So if there is good reason to believe in the presence of a keylogger, paying a forensics expert to discover it and doument this in a fashion that will hold up in court, may be a good idea.
  • by gadzook33 ( 740455 ) on Sunday May 18, 2008 @06:58PM (#23456526)
    For sensitive things like typing in passwords to financial sites, a graphical authentication should be utilized wherein the user "types" with her mouse. But, as has been pointed out, there is no 100% safe protection.
  • by AmiMoJo ( 196126 ) on Sunday May 18, 2008 @07:09PM (#23456602) Homepage Journal
    Simply boot a Knoppix CD and use that. Physically check for hardware keyloggers and you are done.
  • by RiotingPacifist ( 1228016 ) on Sunday May 18, 2008 @07:46PM (#23456842)
    Given that software keyloggers can be found, (rootkit detector and an encrypted partition) is it possible, perhaps only theoretically, to protect youself from phyical keyloggers without taking your keyboard apart?
    Do hardware keylogers supply thier own batteries or could it their power usage be (again theoretically) detected?
    Do they log messages from they computer to the keyboard (e.g lock changed)? could anti key loggers spam the keyboard with lock toggles until the memory fills up?
    With the ones that dump their logs when a key combination is pressed (this is more common in the ones you hide inside they keyboard, could the fact that somebody is trying at a million words per minute be logged?

    sure none of these will keep the nsa off your back, but then again the spouse of the woman the OP is sleeping with is probably just going to have installed some cheap ass detectable software key logger, making 99% of the posts in this thread void (i only saw this [slashdot.org]containing any answers.
  • by JumperCable ( 673155 ) on Sunday May 18, 2008 @08:04PM (#23456936)
    Come back to the guild.
  • by flyingfsck ( 986395 ) on Sunday May 18, 2008 @08:39PM (#23457168)
    If you don't trust the machine, format and re-install it.
  • by dr00g911 ( 531736 ) on Sunday May 18, 2008 @11:10PM (#23458116)
    I'm sensing two people trying to keep a relationship hidden from a spouse. Whether it's physical, long-distance via AIM/email or whatever.

    Huge paranoia probably due to the person you're afraid of intercepting something incriminating is still in the house?

    If my theory isn't the case, tell your friend to get out. Go to family, a shelter, anything. Just get the F out. If there's nothing sinister under the surface here, that's not a healthy relationship. Get. Out. Of. It.

    If my suspicions prove accurate, I can share this:

    I've been on the moral low-ground of a similar situation in my (much) younger, (much) dumber days. The guilty have a tendency to get extremely paranoid about everything. That's not to say that a psychotic husband isn't standing in your bushes with a 9mm at this very moment looking through the window. It happened to me, and that's a point that I really feel the need to drive home. My sloth of a cat jumping when a twig snapped is probably the only reason I'm typing this right now.

    I guess the point of all of this is: tread carefully. Don't be so naïve as to believe that things can't spiral out of control within a single heartbeat in ways that you never imagined. It doesn't even particularly matter if you truly care for the person or if you're just chasing tail. You cannot predict what another person, even one that you feel you know well, is capable of doing when blinded by rage. I've seen people turn homicidal, I've seen people turn self-destructive.

    So the take-away is: watch your ass. If you truly care for this person and it's reciprocated, why haven't they left their spouse? Seems to me that you should be considering a plan for the future as opposed to hiding in the present. You're just delaying the inevitable.
    • by jafiwam ( 310805 ) on Monday May 19, 2008 @08:56AM (#23461206) Homepage Journal
      Just to drive this point home.

      The only thing that stopped me from doing some crap like that, was recognizing that it would ultimately be a self-destructive act. I had all sorts of violence planned for the guy that broke up my marriage, but stopped for two reasons; a) I would get caught and b) it would have killed his dogs too. (I like animals.)

      Despite being an ordinarily very caring and nice person, I was ready to do these things. Pile on it worse, is the spouse has a relationship with them, but NOT so much the third party. So expect to bear the brunt of the anger for TWO people.

      Even if you have no moral restrictions for interfering with a married or otherwise "taken" person, don't do it because you could get killed if you underestimate something. Sex is great, but it's not worth getting killed for.
  • by pclminion ( 145572 ) on Monday May 19, 2008 @02:10AM (#23459072)
    Meddling in two people's fucked up relationship? Sounds like a great way to get yourself into a position to have your ass sued off. Or maybe you'll get lucky and play a role in triggering a murder or suicide. What are you, an idiot? Run the fuck away.
  • by chris_sawtell ( 10326 ) on Monday May 19, 2008 @05:13AM (#23459914) Journal

    What is simple, reliable and most effective?
    Tell your friend to get a lancet, puncture her finger and splash a drop of blood on a vertical surface somewhere in her home which is fairly obvious.

    Have her just vanish. Tell her to leave her passport behind and on no account to touch her bank accounts. Once you are sure she is out of harm's way, Tell the local police that your friend is missing.

    Uncle Sams's paranoid police and vindictive legal system will do all the dirty work for her, and keep her (ex-) spouse securely out of mischief for at least 25 years. End of problem.

    Forget about computers. They are veritable goldmines of all sorts of stories and spoor. Do not use them for private communication - ever.

    • by Ihlosi ( 895663 ) on Monday May 19, 2008 @06:42AM (#23460412)
      Tell your friend to get a lancet, puncture her finger and splash a drop of blood on a vertical surface somewhere in her home which is fairly obvious.



      Don't forget the part about flooding the car so there's inch-deep standing water in it. Even if the spouse in question manages to escape the clutches of the legal system, their car will still be messed up (bonus if it was an expensive car).

  • by L4t3r4lu5 ( 1216702 ) on Monday May 19, 2008 @06:15AM (#23460260)
    This isn't about your spouse wanting to read your email, it's about your spouse not trusting you.

    You need relationship counciling, not security software.
  • by Millennium ( 2451 ) on Monday May 19, 2008 @09:20AM (#23461478)
    There's very little you can do about this, to be honest. A determined person with that sort of access to a computer is only going to be defeated by someone with the same level and amount of access: your friend herself. You won't be able to keep up.

    Nor, frankly, should you. This is a sign of some serious problems in that relationship. Your friend might be to blame, or her spouse might be to blame, or the concept of blame might not even apply; it's tough to tell with the little information here. But the solution here is communication: they need to hash this out between themselves, possibly with a mediator (who should not be you, by the way). The best way to defeat a keylogger is to make the other person not want to install it in the first place.

Good day to avoid cops. Crawl to work.

Working...