1. Computer problem? Tech Support Guy is completely free -- paid for by advertisers and donations. Click here to join today! If you're new to Tech Support Guy, we highly recommend that you visit our Guide for New Members.

Solved: Spyware question #1

Discussion in 'General Security' started by MaxHouston, Apr 28, 2010.

Thread Status:
Not open for further replies.
Advertisement
  1. MaxHouston

    MaxHouston Thread Starter

    Joined:
    Feb 26, 2009
    Messages:
    24
    Is there anyway that someone can remotely track my Internet use (i.e. know when I logon/logoff the internet, be able to view a list of the sites I visit, know my usernames and passwords, install some sort of keylogger software on my computer ) without ever having physical access to my computer? I have a Dell computer with Windows XP. In the past I have heard about keylogger software that has to be physically loaded onto a computer , so that it can be tracked remotely for this information, however I am now wondering has Spyware advanced to the point, that a person wishing this information can maybe send this software in guise of an email attachment of some sort . . . yet this Spyware software is then automatically installed on the email recipients computer (once the attachment is opened) or does this type of software have to still be physically installed on a specific computer so that Internet activities can be remotely tracked?

    Max Houston
     
  2. antimoth

    antimoth

    Joined:
    Aug 8, 2009
    Messages:
    361
    Yes, you can get your PC compromised in an email attachment, or by downloading what you thought was an interesting picture or movie, but it is worse than that.

    There are rogue websites that can load keylogging and other software on your PC if you visit them and click on a link. Some can do this is you just visit them and look w/o clicking on anything.

    The feasibility of infecting your PC will depend on whether your internet browser has security holes, what kind of security software you run, and whether your Windows is fully current. People running out-of-date software are at higher risk, but even the latest versions have been found to have holes. On the plus side, there are things one can do that can help prevent these types of attacks.
     
  3. MaxHouston

    MaxHouston Thread Starter

    Joined:
    Feb 26, 2009
    Messages:
    24
    Antimoth thank you very much for providing the detailed information that you did. (y) Since I am not very computer literate, do you think that if I hire one of those “Computer Gurus” that they would be able to easily find and remove any type of keylogger software on my computer? I occasionally get email attachments and open them only from people that I know and I also occasionally download pictures and movies, yet I would like to know if I have any type of keylogger software on my computer and get it removed.

    Please review and advise. Thank so very much.

    Max
     
  4. MaxHouston

    MaxHouston Thread Starter

    Joined:
    Feb 26, 2009
    Messages:
    24
    One more thing. I was wondering if "keylogger" software tracks you if you are not online/connected to the Internet, and if "keylogger" software tracks your non-Internet use on your computer? :confused:

    Max
     
  5. Byteman

    Byteman Gone but Never Forgotten

    Joined:
    Jan 24, 2002
    Messages:
    17,742
    Yes, a decent monitoring or keylogger software, records all activity in a log that someone can have sent to them or be able to read from a remote location.

    The decent commercially used or pay for ones, are often "excluded" from detection as spyware but this is only done with the knowledge and agreement of the security program's maker, and not all keyloggers are excluded from being detected.
    The type of spyware, rootkit, or keylogger you probably are meaning, is often contained in a file like a movie or game that you find using file sharing utilities. Keygens and cracks for games or programs also are very famous for loading massive amounts of nasty malware on computers....don't become a victim.
     
  6. MaxHouston

    MaxHouston Thread Starter

    Joined:
    Feb 26, 2009
    Messages:
    24
    Thank you so very much Byteman. I greatly appreciate you elaborating on my question in great detail. Now I have a much better understanding of some of the nuts-and-bolts of my keylogger questions.

    Thanks a MILLION!!! (y)

    Max
     
  7. Sponsor

As Seen On
As Seen On...

Welcome to Tech Support Guy!

Are you looking for the solution to your computer problem? Join our site today to ask your question. This site is completely free -- paid for by advertisers and donations.

If you're not already familiar with forums, watch our Welcome Guide to get started.

Join over 733,556 other people just like you!

Thread Status:
Not open for further replies.

Short URL to this thread: https://techguy.org/919829

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice