-
.
key loggers record what u typed on ur computer
not others...
-
[QUOTE=anonymous*2;204*5]key loggers record what u typed on ur computer
not others...[/QUOTE]
Keyloggers are usually installed on someone else's computer, then send the logs back to you via email.
-
[QUOTE=acronifkevin;20488]was the goodluck badluck thing a joke? or should i not use the program or eaven download it.. thnxxx
and what is a cryptor? lol i downloaded it then it needed a password for me to extract the file.. wats up with that?[/QUOTE]
A cryptor modifies a file to avoid detection. The password for that one is: unkn0wn.eu Sometimes they work, sometimes not.
I would stay away from the goodluck one.
-
cool.... thanks.. one prob.... is says acces denied when i use it with a trojan i downloaded from the french webiste... sorry i forgot the name of the site
-
.
ok
say i download a keylogger (which one do u recommend?)
how can i send it to someone and have their typed stuff sent to me..i mean thats what a keyloggers for but how exactly can u sendit to someone and have all that theyved type sent to ME on MY computer?
do u need to like change the settings or just how do u do it??
-
[QUOTE=anonymous*2;20878]ok
say i download a keylogger (which one do u recommend?)
how can i send it to someone and have their typed stuff sent to me..i mean thats what a keyloggers for but how exactly can u sendit to someone and have all that theyved type sent to ME on MY computer?
do u need to like change the settings or just how do u do it??[/QUOTE]
The two that most recommend are Spytector and Ardamax. Spytector is more stealthy. With either one, you enter your settings, like email address you want the logs sent to etc. Then you click make server, and that server is what you email out.
-
"The two that most recommend are Spytector and Ardamax. Spytector is more stealthy. With either one, you enter your settings, like email address you want the logs sent to etc. Then you click make server, and that server is what you email out."
Am I right in thinking that you would need to join the above file to another file using one of these supposedly undetectable file joiners? Otherwise what reason would there be for the victim to download and run the file?
And if so, does anyone have any recommendations for what file to join it to?
-
anonymous, you can join it with another exe like a game. You can also join it with a txt, or video file like wmv, or a pic file. It must have an exe extension like porn_pic.exe or porn_vid.exe.