473,473 Members | 2,073 Online
Bytes | Software Development & Data Engineering Community
Create Post

Home Posts Topics Members FAQ

Keylogger help

1 New Member
Hey, my name's Nick, and I seriously need some help.

One of my friends has been dating his girlfriend for coming up 2 years now, and recently there's been way too many rumours around school she's being unfaithful. A few days ago, he came to me asking for my help for some way of tracking what she types on her PC (I'm his best friend, he knows I'm computer savvy, but I'm nowhere near code-savvy :\), and I've agreed to help him.

I have no knowledge of keyloggers, and she has security software. I have no knowledge of how to send this keylogger either.

Thus I am asking for help. She has basic security software (a lame brand I've never heard of), and I have no knowledge of how to send it. Could anybody help me code a keylogger? Any help sending one as well?

Please please PLEASE if you code one do NOT make it malicious, I've only found this site through Google, I don't know if you would or not, but that's the only reason I've heard people using keyloggers for.

Yours with sincere gratitude,
Nick.
Jul 19 '08 #1
3 2055
JosAH
11,448 Recognized Expert MVP
Wouldn't that be an infringement on someone's privacy? Even the police needs
to have formal permission before they're allowed to tap someone's phone. I think
your friend should talk with his girlfriend instead of trying to spy on her. That would
never be a fine basis for a healthy relationship.

kind regards,

Jos
Jul 19 '08 #2
Banfa
9,065 Recognized Expert Moderator Expert
Not to mention that on this site we do not provide solutions to people we help them with the problems they are having while writing their own code and that discussion of malicious software (which a keylogger falls under) is against site rules and could lead to a ban on you account.

As Jos has said, open discussion with the his girl friend (no accusatory) is the only real way forward. Any worthwhile relationship requires trust and spying on the other person is probably one of the least trusting things you can do. If he got found out then it would almost certainly end the relationship.

If having talked to her he still can't trust her then their probably is no relationship left.
Jul 19 '08 #3
sicarie
4,677 Recognized Expert Moderator Specialist
Nick-

As you can see, there are strong feelings and rules against this sort of thing on this site. As you were very upfront about it, this is a warning - while we welcome discussion on most topics - please do not attempt to discover or create malicious code or methods on this site. Doing so will have action taken against your account as described in the Posting Guidelines .

Please have a look through there, as we state the rules of this site. I hope you stick around to become more code savvy - of course, in a non-malicious or illegal (as it is her computer it is very illegal) way.

This thread is now closed as the rules on this especially are non-negotiable, though I'd be more than happy to discuss them through a PM if you're confused about anything.

Thanks and welcome,

sicarie
Jul 19 '08 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

0
by: Kevin | last post by:
i'd like to create a KeyLogger that saves to a file, the keystrokes and the program/window changes, that a user does. i wanted to know if there's a better way to do this than using a timer and the...
21
by: Dave | last post by:
After following Microsofts admonition to reformat my system before doing a final compilation of my app I got many warnings/errors upon compiling an rtf file created in word. I used the Help...
6
by: wukexin | last post by:
Help me, good men. I find mang books that introduce bit "mang header files",they talk too bit,in fact it is my too fool, I don't learn it, I have do a test program, but I have no correct doing...
12
by: Jay | last post by:
ok, i thought for 2 seconds i might have created a Keylogger in python but i still have one major think stopping me... PYTHON. when i run the program i have python create a file named keylog2.log...
2
by: Du Dang | last post by:
i wanna use keys combo to show and hide my app could someone show me how to capture global key strokes ??? essentially it behave like a keylogger program, but it not :-) thanks
11
by: CodeLeon | last post by:
Hi. I would like to create a keylogger, are there any good tutorials? Also, more importantly, how do i hide this process from the task manager? NO, i am not a virus writer, so PLEASE no messages...
2
by: JC | last post by:
I'm looking for help creating a keylogger program.It doesn't have to be hidden because I want to allow people access to what they have written. Can anyone help me with this or send me tutorials or...
10
by: Apolakkiatis | last post by:
Does anyone have a tutorial they could give me or post on how to make a keylogger to monitor my computer because my brother also uses it.... i dont want just the code for one, i want to understand...
4
by: pavanip | last post by:
Hi friends, I am developing one application like Anti spyware.how to get those spyware dlls present in our registry or our system.And what is adware,Trojans, Malware, Keylogger.how to find...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
1
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
1
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...
0
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The...
0
by: adsilva | last post by:
A Windows Forms form does not have the event Unload, like VB6. What one acts like?
0
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated ...
1
muto222
php
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.