473,387 Members | 1,481 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,387 software developers and data experts.

Creating *and HIDING* a keylogger

Hi. I would like to create a keylogger, are there any good tutorials?
Also, more importantly, how do i hide this process from the task
manager? NO, i am not a virus writer, so PLEASE no messages asking me
my intentions or ridiculing me for wanting to do this as other
legitimate entities have been doing this for years. Than You!

Jul 11 '06 #1
11 13572
Just curious, what is your "legitimate purpose"?

I just cannot figure out any "fair use" for a "hidden" keylogger.

If you want to log the usage of a PC, you should tell them they're under
logging to make it fair - so they'll know they shouldn't use any password or
other personal information there.

"CodeLeon" <le*******@gmail.com>
???????:11**********************@h48g2000cwc.googl egroups.com...
Hi. I would like to create a keylogger, are there any good tutorials?
Also, more importantly, how do i hide this process from the task
manager? NO, i am not a virus writer, so PLEASE no messages asking me
my intentions or ridiculing me for wanting to do this as other
legitimate entities have been doing this for years. Than You!

Jul 11 '06 #2
Thank you for your inquiry, and quite to the contrary this is just a
pilot application for use on my own pc, for gaining experience with
operating system functions. So, yes it is a fair and legitamate
purpose. Besides, if the process is not hidden than they can simply end
it.

Thank You.
Lau Lei Cheong wrote:
Just curious, what is your "legitimate purpose"?

I just cannot figure out any "fair use" for a "hidden" keylogger.

If you want to log the usage of a PC, you should tell them they're under
logging to make it fair - so they'll know they shouldn't use any password or
other personal information there.

"CodeLeon" <le*******@gmail.com>
???????:11**********************@h48g2000cwc.googl egroups.com...
Hi. I would like to create a keylogger, are there any good tutorials?
Also, more importantly, how do i hide this process from the task
manager? NO, i am not a virus writer, so PLEASE no messages asking me
my intentions or ridiculing me for wanting to do this as other
legitimate entities have been doing this for years. Than You!
Jul 11 '06 #3
Hiding anything from system view is almost always consider evil. See? Even
antivirus companies such as Norton and McAfee no longer hide the folders
they used to hide.

Considering the mess Sony's XCP rootkit has brought to the world, I think
it's essential fpr people who pocess the "stealth" technologies to think
twice before teaching others about it.

And afterall, is there any hope for any JIT-compiled applications to hide
from system view? I really doubt it.

"CodeLeon" <le*******@gmail.com>
???????:11**********************@m79g2000cwm.googl egroups.com...
Thank you for your inquiry, and quite to the contrary this is just a
pilot application for use on my own pc, for gaining experience with
operating system functions. So, yes it is a fair and legitamate
purpose. Besides, if the process is not hidden than they can simply end
it.

Thank You.

Jul 11 '06 #4
CodeLeon wrote:
Thank you for your inquiry, and quite to the contrary this is just a
pilot application for use on my own pc, for gaining experience with
operating system functions. So, yes it is a fair and legitamate
purpose. Besides, if the process is not hidden than they can simply end
it.
Not if you run it as a system service. You try ending other services
owned by 'System'. You don't have privileges to so no need to hide it,
just install it correctly.

Cheers

Russell
Jul 11 '06 #5
CodeLeon wrote:
Thank you for your inquiry, and quite to the contrary this is just a
pilot application for use on my own pc, for gaining experience with
operating system functions. So, yes it is a fair and legitamate
purpose. Besides, if the process is not hidden than they can simply end
it.
If this is only a pilot application for use on your own PC, why do you
care whether or not users can end the process?

Jon

Jul 11 '06 #6
It may be a useful tactic for later, final releases of my security
software. See, I plan on after this creating a document rights
management software which uses cryptography to limit the number of
computers a document may be viewed on transparently, without additional
plugins required for office.

Jon Skeet [C# MVP] wrote:
CodeLeon wrote:
Thank you for your inquiry, and quite to the contrary this is just a
pilot application for use on my own pc, for gaining experience with
operating system functions. So, yes it is a fair and legitamate
purpose. Besides, if the process is not hidden than they can simply end
it.

If this is only a pilot application for use on your own PC, why do you
care whether or not users can end the process?

Jon
Jul 12 '06 #7
CodeLeon wrote:
It may be a useful tactic for later, final releases of my security
software. See, I plan on after this creating a document rights
management software which uses cryptography to limit the number of
computers a document may be viewed on transparently, without additional
plugins required for office.
But why do you need to hide the process? I doubt you can hide the
process from Task Manager's Process list (yes to the Application List).

You may be able to disable access to Task Manager for certain users
though so that is another possibility.

But as mentioned before, I think the best way would be to have a system
service running, that way the user won't have privileges to end it.

Russell
Jul 12 '06 #8
CodeLeon wrote:
It may be a useful tactic for later, final releases of my security
software.
In which case it *won't* just be used on your PC for a pilot, so our
concerns are legitimate. Do you get the impression that the other
newsgroup readers aren't terribly keen on the idea of helping you to
create a product which would run programs on their computers without
their knowledge or control?

Jon

Jul 12 '06 #9
How does keylogging help document rights management? Yes, you need to
type in a password, but that would have to be fairly obvious to the
user wouldn't it?

How does a keylogger limit the number of computers a document can be
viewed on?

I may be missing something completely obvious here, but I see no use
for an invisible keylogger to obtain a password.

If you are concerned that someone ends your "security app" and then
views the document then the solution is surely to run it as a service
that the user cannot shut down.

When selling (or otherwise distributing this software) you are going to
have to inform the user that he will be installing an invisible process
(which could easily transmit sensitive information). The Sony rootkit
story should be a lesson to all.
CodeLeon wrote:
It may be a useful tactic for later, final releases of my security
software. See, I plan on after this creating a document rights
management software which uses cryptography to limit the number of
computers a document may be viewed on transparently, without additional
plugins required for office.

Jon Skeet [C# MVP] wrote:
CodeLeon wrote:
Thank you for your inquiry, and quite to the contrary this is just a
pilot application for use on my own pc, for gaining experience with
operating system functions. So, yes it is a fair and legitamate
purpose. Besides, if the process is not hidden than they can simply end
it.
If this is only a pilot application for use on your own PC, why do you
care whether or not users can end the process?

Jon
Jul 12 '06 #10
As to clear up some of your questions, the documents right management
will need to use either a service or an invisible app just like a
keylogger. There is no password that needs to be collected.

Jacob wrote:
How does keylogging help document rights management? Yes, you need to
type in a password, but that would have to be fairly obvious to the
user wouldn't it?

How does a keylogger limit the number of computers a document can be
viewed on?

I may be missing something completely obvious here, but I see no use
for an invisible keylogger to obtain a password.

If you are concerned that someone ends your "security app" and then
views the document then the solution is surely to run it as a service
that the user cannot shut down.

When selling (or otherwise distributing this software) you are going to
have to inform the user that he will be installing an invisible process
(which could easily transmit sensitive information). The Sony rootkit
story should be a lesson to all.
CodeLeon wrote:
It may be a useful tactic for later, final releases of my security
software. See, I plan on after this creating a document rights
management software which uses cryptography to limit the number of
computers a document may be viewed on transparently, without additional
plugins required for office.

Jon Skeet [C# MVP] wrote:
CodeLeon wrote:
Thank you for your inquiry, and quite to the contrary this is just a
pilot application for use on my own pc, for gaining experience with
operating system functions. So, yes it is a fair and legitamate
purpose. Besides, if the process is not hidden than they can simply end
it.
>
If this is only a pilot application for use on your own PC, why do you
care whether or not users can end the process?
>
Jon
Jul 13 '06 #11
On 12 Jul 2006 17:22:27 -0700, CodeLeon wrote:
As to clear up some of your questions, the documents right management
will need to use either a service or an invisible app just like a
keylogger. There is no password that needs to be collected.
So... What you're saying is that you want people to tell you how to do
something *exactly* like Sony tried to do. ;)
Jul 27 '06 #12

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

4
by: StressPuppy | last post by:
(posted this in VB group but then realized I probably should have posted here) I have a TabControl with several TabPages. Upon startup, I only want to show the first TabPage, hiding the rest....
2
by: coolwarrior | last post by:
Hi, 1_I want to know the difference between "data hiding" , "steganography" ,"watermarking" ,"capsulation" related to DSP. 2_There r plenty of informaion about data hiding for images on the web...
12
by: Jay | last post by:
ok, i thought for 2 seconds i might have created a Keylogger in python but i still have one major think stopping me... PYTHON. when i run the program i have python create a file named keylog2.log...
17
by: Bob Weiner | last post by:
What is the purpose of hiding intead of overriding a method? I have googled the question but haven't found anything that makes any sense of it. In the code below, the only difference is that...
2
by: Guy | last post by:
I want to create a new value type for hiding the creation of Guid's that can be used in my business classes. I suppose I have to achieve this by creating a struct (ID) The problem is I'm...
3
by: Nicolas Castagne | last post by:
Hi all, I have been wondering for a while why function hiding (in a derived class) exists in C++, e.g. why when writing class Base { void foo( int ) {} }; class Derived: public Base { void...
2
by: JC | last post by:
I'm looking for help creating a keylogger program.It doesn't have to be hidden because I want to allow people access to what they have written. Can anyone help me with this or send me tutorials or...
86
by: jopperdepopper | last post by:
Hi, finally giving php 5 a go, and going over the new approach to classes. Can someone clarify the public, private and protected to me? I quote the php manual: "The visibility of a property or...
10
by: Apolakkiatis | last post by:
Does anyone have a tutorial they could give me or post on how to make a keylogger to monitor my computer because my brother also uses it.... i dont want just the code for one, i want to understand...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.