Does anyone have a tutorial they could give me or post on how to make a keylogger to monitor my computer because my brother also uses it.... i dont want just the code for one, i want to understand how the VB code for it works also so i can get a feel for it... Thanx
10 4111
I don't think keylogging is the best way to find out such things. See if you can find something in your logbooks, or if you have Vista, use parental control.
I don't think keylogging is the best way to find out such things. See if you can find something in your logbooks, or if you have Vista, use parental control.
Ya but i also wanna understand how one is made too... and with parental controls it blocks most of the normal sites that are approved for him so im really looking into a keylogger tutorial for vb
Your intentions may be innocent but it's unlikely anyone here will help or supply code for you to create a keylogger...
They're kind of frowned upon in the programming world.
...They're kind of frowned upon in the programming world.
That's right. And any decent anti-malware software should detect and disable the keylogger if you do get it working.
Keyloggers are unpopular because they are a favourite way for hackers to gather critical information such as passwords, credit card details, and so on. So don't be surprised if you encounter some pretty hostile reactions in this particular quest for knowledge.
OHHH, no way! I just want to montior what goes on on my computer, I hope people will understand that... Thanx for the clarification
Well I went looking and I found a semi-keylogger, it's not for destructive use, but rather for experimenting.... here is the code..... - Public Class Form1
-
Dim result As Integer
-
Dim i As Double
-
Private Declare Function GetAsyncKeyState Lib "user32" (ByVal vKey As Integer) As Integer
-
-
-
Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles MyBase.Load
-
Timer1.Interval = 10
-
Timer1.Enabled = True
-
End Sub
-
-
Private Sub Timer1_Tick(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Timer1.Tick
-
For i = 32 To 128
-
result = 0
-
result = GetAsyncKeyState(i)
-
-
-
If result = -32767 Then
-
TextBox1.Text = TextBox1.Text + Chr(i)
-
End If
-
Next i
-
End Sub
-
-
Private Sub Button1_Click_1(ByVal sender As System.Object, ByVal e As System.EventArgs) Handles Button1.Click
-
TextBox1.Text = ""
-
End Sub
-
End Class
Can someone please break it down for me, because it's not malicious or hidden, it's for everyone to see on the screen. I want to understand the script better.
But if anyone does have a tutorial can they please send it to me, because it's important to me that I don't have my brother doing inappropriate things on the computer, he's a wild kid and hard to handle at times... ANY HELP would be greatly appreciated! Thanks guys!
Hey...instead of making .....a keylogger...why not make a program that captures the screen...every so often and stores it.....that way...you don't have to rely on what he types ...and an antivirus (etc) will probably not disable it........
It also gives you a beeter idea as to what is actually going on...also if your using vb08...i would make the form opacity =0% make it not appear in the taskbar add a icon in the tool tray that has a context menu that enables you to restore the opacity to 100% if you enter the correct password...
To capture the screan...there are already some post on this....use the seach at the top of the screen....
Hey...instead of making .....a keylogger...why not make a program that captures the screen...every so often and stores it.....that way...you don't have to rely on what he types ...and an antivirus (etc) will probably not disable it........
It also gives you a beeter idea as to what is actually going on...also if your using vb08...i would make the form opacity =0% make it not appear in the taskbar add a icon in the tool tray that has a context menu that enables you to restore the opacity to 100% if you enter the correct password...
To capture the screan...there are already some post on this....use the seach at the top of the screen....
Yea, i think thats a good idea man, but itll probably take up a lot of space if it captures the sceen often... :-(
Yea, i think thats a good idea man, but itll probably take up a lot of space if it captures the sceen often... :-(
Well you can all ways delete the pictures after you view them.....any way i should think 5min intervals is good enough
Well you can all ways delete the pictures after you view them.....any way i should think 5min intervals is good enough
OK well thanx alot man!
Sign in to post your reply or Sign up for a free account.
Similar topics
by: Jay |
last post by:
ok, i thought for 2 seconds i might have created a Keylogger in python
but i still have one major think stopping me... PYTHON. when i run the
program i have python create a file named keylog2.log...
|
by: Du Dang |
last post by:
i wanna use keys combo to show and hide my app
could someone show me how to capture global key strokes ???
essentially it behave like a keylogger program, but it not :-)
thanks
|
by: Florence HENRY |
last post by:
Hello,
well, almost everything is in the subject !
I have to fill 2 tables (more complicated than in the example !):
CREATE TABLE A (
id serial primary key,
foo text);
|
by: spookyu |
last post by:
Alright, I'm sure your tired to hearing this but...does anyone know of
any GOOD tutorial's for learning c#. The more basic the better, I have
NO experience with programing before this other than...
|
by: cj |
last post by:
My company just purchased SocketTools Visual Edition from Catalyst with
the intent that I would use the included Socketwrench tool to create a
server application to receive and respond to requests...
|
by: RC |
last post by:
KML is Google Map version of XML
I tried some example here
http://earth.google.com/kml/index.html
with my data, but doesn't work.
The tutorial there is not so good neigther.
Is there a...
|
by: CodeLeon |
last post by:
Hi. I would like to create a keylogger, are there any good tutorials?
Also, more importantly, how do i hide this process from the task
manager? NO, i am not a virus writer, so PLEASE no messages...
|
by: Sandy Tipper |
last post by:
I have never had a textarea content change, in any browser.
On several different projects.
With javascript enabled (other stuff works.)
I have read lots, and everyone says it should work.
Can...
|
by: NickNeedsHelp |
last post by:
Hey, my name's Nick, and I seriously need some help.
One of my friends has been dating his girlfriend for coming up 2 years now, and recently there's been way too many rumours around school she's...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: ryjfgjl |
last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
|
by: ryjfgjl |
last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: Sonnysonu |
last post by:
This is the data of csv file
1 2 3
1 2 3
1 2 3
1 2 3
2 3
2 3
3
the lengths should be different i have to store the data by column-wise with in the specific length.
suppose the i have to...
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
| |