From: “Z.B.” <zachb@netcom.com>
To: Scott <scott-b@ix.netcom.com>
Message Hash: c78558cc6f9c2c826b3fb2bcabafab373804a9dcb04ff4422a8e427174802299
Message ID: <Pine.3.89.9702021014.A2250-0100000@netcom3>
Reply To: <2.2.32.19970202043909.006c8dd0@popd.ix.netcom.com>
UTC Datetime: 1997-02-02 18:15:27 UTC
Raw Date: Sun, 2 Feb 1997 10:15:27 -0800 (PST)
From: "Z.B." <zachb@netcom.com>
Date: Sun, 2 Feb 1997 10:15:27 -0800 (PST)
To: Scott <scott-b@ix.netcom.com>
Subject: Re: Keystroke sniffer question
In-Reply-To: <2.2.32.19970202043909.006c8dd0@popd.ix.netcom.com>
Message-ID: <Pine.3.89.9702021014.A2250-0100000@netcom3>
MIME-Version: 1.0
Content-Type: text/plain
On Sat, 1 Feb 1997, Scott wrote:
> How can you detect if there is a keystroke sniffer on your computer.
>
All sniffers have to write to disk at some point. You can detect one by
checking to see how much disk space you have (DIR on MSDOS), typing a few
lines of random characters, and check your disk space again. If it's
gone down a little, then you probably have one.
> Is there a file name to look for?
Try checking in your TEMP directory...the few ones that I've seen default
to creating an invisible file in that directory.
> Where do people get them?
They either buy them or write them.
Zach Babayco
zachb@netcom.com <-------finger for PGP public key
If you need to know how to set up a mail filter or defend against
emailbombs, send me a message with the words "get helpfile" (without the
" marks) in the SUBJECT: header, *NOT THE BODY OF THE MESSAGE!* I have
several useful FAQs and documents available.
Return to February 1997
Return to ““Z.B.” <zachb@netcom.com>”