From: D.M. Procida on
Adrian C <email(a)here.invalid> wrote:

> Friend is convinced that someone else got physical access to his Mac
> (OSX) and planted a key logger on it.

How likely is this, compared to all the other things that cohere with
the evidence that makes him suspect a key-logger?

It might well be that someone has obtained information that should not
properly have been obtainable, but if someone has had physical access to
the machine and the technical nous to install such software, there are
other things they could have lifted from the machine.

And that's not to mention other possibilities.

Daniele
From: Rowland McDonnell on
J. J. Lodder <nospam(a)de-ster.demon.nl> wrote:

> Adrian C <email(a)here.invalid> wrote:
>
> > Friend is convinced that someone else got physical access to his Mac
> > (OSX) and planted a key logger on it.
>
> Just reinstall the system.
>
> > Can anyone recommend a suitable, cheap, easy to use program that can
> > scan a Mac system for something as nasty as this?
>
> Begin with Little Snitch
> for monitoring unauthorized outgoing trafic.
> A keylogger that doesn't connect to the outside world
> won't be much use to anyone,

Very good point.

However - what about a hypothetical keylogger that subverts an existing
Mac process that already (perhaps) has permission to talk to the outside
world?

Is that a real risk, or what?

Rowland.

--
Remove the animal for email address: rowland.mcdonnell(a)dog.physics.org
Sorry - the spam got to me
http://www.mag-uk.org http://www.bmf.co.uk
UK biker? Join MAG and the BMF and stop the Eurocrats banning biking
From: Adrian C on
On 26/06/2010 22:41, D.M. Procida wrote:
> Adrian C<email(a)here.invalid> wrote:
>
>> Friend is convinced that someone else got physical access to his Mac
>> (OSX) and planted a key logger on it.
>
> How likely is this, compared to all the other things that cohere with
> the evidence that makes him suspect a key-logger?

I'm not 100% sure myself that he has a key-logger. He's an elderly chap
probably exposed to some information published in the 'daily mail' on
the existance of this.

However, the girl that visited the computer (young 'friendly' one from
the tennis club apparently) is clearly up to no good disseminating my
friend's private emails to all and sundry, and causing considerable
upset by this.

> It might well be that someone has obtained information that should not
> properly have been obtainable, but if someone has had physical access to
> the machine and the technical nous to install such software, there are
> other things they could have lifted from the machine.
>
> And that's not to mention other possibilities.

Yep. :-(

--
Adrian C
From: Woody on
Adrian C <email(a)here.invalid> wrote:

> Friend is convinced that someone else got physical access to his Mac
> (OSX) and planted a key logger on it.
>
> Can anyone recommend a suitable, cheap, easy to use program that can
> scan a Mac system for something as nasty as this?

In activity monitor you can get a list of all applications running, look
for anything that shouldn't be there.

To key log the thing would need admin access so it would have needed to
be installed by someone who knew the password (even if it was logged
in).
It would also need internet access, so either little snitch to tell you
when something is connecting or netstat which will show you what is
connected to where.

--
Woody

www.alienrat.com
From: Chris Ridd on
On 2010-06-26 23:51:19 +0100, Adrian C said:

> On 26/06/2010 22:41, D.M. Procida wrote:
>> Adrian C<email(a)here.invalid> wrote:
>>
>>> Friend is convinced that someone else got physical access to his Mac
>>> (OSX) and planted a key logger on it.
>>
>> How likely is this, compared to all the other things that cohere with
>> the evidence that makes him suspect a key-logger?
>
> I'm not 100% sure myself that he has a key-logger. He's an elderly chap
> probably exposed to some information published in the 'daily mail' on
> the existance of this.
>
> However, the girl that visited the computer (young 'friendly' one from
> the tennis club apparently) is clearly up to no good disseminating my
> friend's private emails to all and sundry, and causing considerable
> upset by this.

It sounds more likely that she's altered Mail to bcc her, or something
like that. Does he use Mail, and what sort of mail accounts (gmail,
etc) does he have?

--
Chris

First  |  Prev  |  Next  |  Last
Pages: 1 2 3 4 5 6 7 8
Prev: Unison 2.0.5 font ?
Next: A bit of a cleanup...