TER General Board

How bout wat is suggested in the thread below?
dcnarwhal 13 Reviews 4668 reads
posted

Do the programs mentioned in the thread below not take care of this?  I would be badly surprised if they didn't.

Figure that anyone who wants to and has $99.00 to do it with can destroy you. or vice versa... Non detectable, installs through an e-mail, will not be stopped by spyware programs or other utilities and it seems able to get past all firewalls. Can anyone here tell us it isn't the threat it appears to be?

Anonymous Bald Man3766 reads

..they have to be able to install it on your computer. If you don't give your wife "install" (Power User/Administrator) privileges on your computer, you shouldn't have a problem.

I can't imagine how they'd pull off the "remote" install if you have a firewall or your emailing from your work computer, but maybe Webbie does.

Update: I read about the "remote install"... the program emails an EXE attachment to the target computer, and the recipient then has to open/run the exe for it to install. Needless to say but, if you're dumb enough to run EXE attachments you get via email, it's not likely you would survive long in this hobby anyway.

-- Modified on 8/23/2005 4:04:47 PM

WebTerrorist2277 reads

Don't run the your computer as an admin.
Set up limited accounts for yourself and anyone else that uses the machine, and only log into the admin account when you absolutely have to, to do installs etc.
With a limited account you can't install anything on purpose or accidentally.
So even if someone did send you a email with an installer, you wouldn't have the permissions required for it to install.
If someone wanted to physically install it, if none of the accounts they have access to, including trying to do it theough your personal account, again, not allowed.

Also, don't open email attachments.  
That is rule one for avoiding all kinds of nasty things.
I am not sure how they can make the claim of installing remotely through a firewall, unless they somehow make it look like your email client, or another application is what is accessing, and that would have already been given permission to access the internet, or try and "piggyback" on something you have allowed, most software firewalls ask about access on a per application basis, and a good software firewall will alert if the application information has changed since you last gave permission so spoofing another app wouldn't work in that case.
If it is just through a router and Hardware firewall, I guess they could use the ports that are already open, like 80, to do the install.
Me I always go with the "belt and suspenders" approach to firewalls, hardware and software.  :)

To stop something like this...don't open email attachments (especially not exe.s -and always set your folder options to "show extensions for known file types, this keeps anyone from sending a "nekkid.jpg.exe" where it then looks like Nekkid.jpg, so you don't know it is actually an exe, if the file type is shown you will know what you are getting) and log into a limited account for all your general computing stuff and only log into admin acoounts for admin type stuff.

To set the show extensions:
open "My Computer"
Click on "Tools"
Go to "Folder Option"
"View" tab
scroll down and remove the check from the
"Hide extensions for known file types" check box,
click "OK"

Do the programs mentioned in the thread below not take care of this?  I would be badly surprised if they didn't.

that it's being addressed and there are viable solutions. Whew!!

there are many stealth logger programs.. cheaper than 99.00

Memory hogs of course..

Dont compute from home. And you havent much worries.

I was living with a woman and she was a suspicious sort

BTW I had never cheated on her...I got into this hobby AFTER we had broken up because I knew it would be some time before I could deal with a real life relationship after her

Anyway...she had used MY CC to buy that exact program and installed it on my computer without me knowing

For about eight months it was emailing her EVERYTHING done on my computer...I was never busted since I hadn't done anything but after we had broken up and she moved a 1000 miles away all of a sudden as a prank she began sending me the emails my computer was sending her...this was my first inkling my computer was compromised

I was royally pissed...she thought this was funny...I know a bit about computers and even so it still took me a month to clear the damned program out...it changes file names...breaks them up so you can't ID them by size and has a million other tricks to hide from you..removing 90% of it still doesn't stop it from emailing the person everything you do

I even contacted the company that makes eBlaster telling them their program had been purchased using MY CC without my knowledge...they were profoundly disinterested...in essense I was told to go piss up a rope...tough noogies

I now have more security programs than most banks and no one is allowed to use my computer except for me...this is NEVER going to happen to me again

Register Now!