Keylogger and JPF 2

Discussion in 'other anti-malware software' started by n8chavez, Aug 22, 2008.

Thread Status:
Not open for further replies.
  1. n8chavez

    n8chavez Registered Member

    Joined:
    Jul 19, 2003
    Posts:
    3,347
    Location:
    Location Unknown
    How do keyloggers work? I know what they do, but not how they do it. Do they function by any of the below methods?

    write to application's memory
    create remote thread
    create hidden window
    install global hook
    modify child process
    direct memory access
    critical registry modification
    send message to another application
    control process
    control system services

    I ask because I recently decided to switch from LnS to Jetico and I wanted to know if I am protected. JPF can protect from the above, but when I tried this test I wasn't alerted at all.
     
  2. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    See this wikipedia article. You can also use AKLT to test your security programs.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.