Jump to content

Northerner

Experienced Members
  • Posts

    45
  • Joined

  • Last visited

Posts posted by Northerner

  1.  

    Yes, you have to uncheck both options if you want to disable the new Monitoring feature:

    Are there advantages in having the new Monitoring feature and for what reaons might some individuals want to disable it?

    Thanks for your previous answers!

  2.  

    In case anyone missed the posts about it, Piriform quickly released a new build this afternoon as a result of the confusion that the Active System Monitoring caused in the last update.

     

     

    Active Monitoring can now be disabled by:

     

    1. Open CCleaner, then click Options > Monitoring

    2. Disable System Monitoring by unticking the box next to "Enable System Monitoring"

    3. Disable Active Monitoring by unticking the box next to "Enable Active Monitoring", and click Yes when the confirmation box appears

     

    https://www.piriform.com/ccleaner/builds

    Excuse my lack of ability, but where do I find "Enable Active Monitoring" and the box next to it. Are there any reasons why someone might not want to download the new version 4.18.4844?
  3.  

    (#1) OK, the 1st bug was this: CCleaner claimed it needed to update to 4.18.4844, but when I tried to, the most recent update available was 4.18.4842 - the same update I was running!

    The same thing happened to me.

    At first I thought 4.18.4844 applied only to the paid or professional versions.

    So can I download 4.18.4844, for the free version of CCleaner, or is there some reason for staying with version 4.18.4842?

  4. I got my knuckles rapped for introducing a second thread on keyloggers.

    I did so because I felt the first thread was, to a certain extent, drifting away from the original questions I asked. Having said that, I think it is natural,and inevitable, that some threads develop, in this way, and I have no complaints about the process.

    I will take hazelnut's advice and have a look at SpyShelter. I'm also interested in hearing opinions about any other anti-keylogger programmes such as KeyScrambler.

    As far as antivirus software detecting the presence of keyloggers the impression I have always had is that some keyloggers can be found whilst others are too sophisticated for basic antivirus software. Is that an accurate assessment of the situation?

  5. I don't think anyone is suggesting that a keylogger is uncomplicated. Hazelnut knows that if you go to any of the forums recommended in that linked topic, they can diagnose even complicated issues, and if it is necessary to take your machine to a shop they will suggest that.

     

    Also, there are snooper type applications that do not reside on your hard drive. Those experts at those other forums would recognize the signs of them. Too involved to discuss here, and I'm no expert anyhow.

     

    And, thanks for the information...I didn't know that a hard drive would deteriorate like that. Gotta google that and check out all the old HDs I have boxed up here.

    Altho' I was told that I am far from certain a hard drive will deteriorate. I was asking a question, not making a statement of fact.

    Perhaps someone here does know the answer.

  6. That is weak evidence for a keylogger.

    Perhaps I should have emphasised that these "odd" events happened much more often on Internet forums/message boards.

    I would type something into Google and the same name/word would appear, as a new member, on forums I visited.

    This happened with quite a number of names, or words, over a considerable period of time.

    I do not believe my evidence is weak but, even if that is the case, I said in my OP I said that all I wanted was a definite answer. I don't see what the problem is with that unless the process of finding a keylogger is very difficult, time-consuming, and can lead to a result that does not give a clear, and unambigous, answer.

    I suspect that may sometimes be the case.

    .

  7. My advice would still be to get your machine checked by one of the malware removal forums. That is all they deal with on a day to day basis and therefore are quite skilled in it.

     

    A computer repair shop, although good, does not specialise in this sort of thing.

     

    Also how do you connect to the internet? Hardware router? What sort of security setting does it have? Is it locked with a password of YOUR choice or just the default admin and password settings?

     

    Have you changed all email passwords ? (do this from a clean machine)

     

    What operating system do you run?

    I will take your advice and go to one of the forums you mention.

    As far as the router is concerned it is a physical (hardware) object called the British Telecom (BT) Home Hub 2.0. I assume the security settings are "the default admin. and password settings".

    The operating system is Windows XP.

    I will change my email passwords from another machine. Of course, for me, the most important fact was that I received several emails from someone who was using a name I had recently typed into Google. If my machine does have a keylogger, on board, I am fairly certain it has been installed by someone I know, and that bothers me.

    Last, if a keylogger is found is it possible to establish the identity of the installer?

  8. Scooped by Hazelnut. :P

     

    Just my opinion, but I think that issue is pretty complicated, no generic answers are dependable, it needs a specific analysis of that computer.

    Thanks to you and Hazelnut for the replies.

    But this is what I mean by contradictory information. You seem to be saying that the process of finding a keylogger, once inslalled, is a much more complicated process than Hazelnut is suggesting. That is why I asked questions 1 and 2 in my opening post.

    As far as question 3 is concerned I heard somewhere (probably wrongly) that a computer hard drive deteriorates, over time, if removed from the machine. Obviously if I wanted to go to a specialist it would be much easier to send the hard drive only

    I am aware that it is possible to imagine problems, but given the fact it does not appear to be.unduly difficult to install a keylogger I find it difficult to understand why some regard this as a remote possibility.

    Lastly, I have opened email attachments, despite having doubts, on more than one occasion, and I realise if a keylogger is installed then my posts, to the CCleaner Forum, will show.

  9. What makes you think you may have a keylogger installed?

     

    Don't forget that sometimes an anti-virus program with a behaviour blocker or HIPS capability, can give you a popup saying they have detected keylogger type behaviour and name the 'suspect'

     

    Sometimes the program they flag has keylogger type features (such as a screen capture program) and is a legitimate program which, if you got from a trusted source, you can stop worrying about.

     

    If however you are really getting worried about this go to a Malware Removal forum, tell them your circumstances, and take it from there

     

    See here for list...

     

    http://forum.pirifor...showtopic=34786

    What makes me think i may have a keylogger on my PC?

    I would type the name of a person,or subject, into Google and then I would receive an email that came from someone with the same name. At other times the same name would appear, as a new member, on a couple of Internet forums I sometimes post on. This did not happen every day but, in my view, happened far too often to be simply put down as chance!

    I have Avast anti-virus and have not had any kind of false positive warnings mentioning keyloggers.

  10. I'm interested in getting some information, and advice, about keyloggers.

    I have tried, recently, to get information from different sources, but feel I have been given contradictory advice.

    I understand that one method of putting a software keylogger on another computer is by sending an email with an attachment. Then, of course, the attachment needs to be opened for the keylogger to operate. The process would not appear to be a difficult task for an individual with some knowledge.

    I think I may have a software keylogger on my PC. I could be wrong but I would like to get a definite answer. My questions are;-

    1) How easy is it to find a software keylogger once it is on a PC?

    2) Does it make sense to go to some kind of forensic computer specialist rather than someone whose abitity, with computers, is of a more general nature?

    3)If one decides to go to a specialist, and none are close at hand, is it possible to simply send the hard drive after having extracted it from the PC?

    4) Has anyone further information, of any kind, such as other Internet forums or sources where I might get useful information? I live in the UK.

  11. If Avast won't load try restarting your computer, could easily be a driver or file it needs couldn't load for whatever reason and it wouldn't be the first time such an issue has stricken an anti virus product.

    This seems to have worked. Thanks!

    Three questions:-

    1) How do I find out which version of Avast I am using?

    2)If I ever want to uninstall current version can I do that by going to control panel and then to add/remove programmes or do i need a special uninstall tool?

    3) If I ever decide to uninstall Avast and replace it I thought of Microsoft Security Essentials (MSE) or Panda Cloud anti-virus.

    Does anyone have any comments on either of these or any other free system recommendations?

  12. I hope this is the right sub forum.

    I have had Avast free antivirus, on my computer, for some time. Today I have clicked the desktop icon several times and Avast does not appear.

    Given such limited information, does anyone know what the problem might be and are there any relatively simple steps I could take to fix it?

  13. You are incorrect. Avast protected you. Stop trying to kid yourself it was a false positive.

     

    What happened to the forum earlier was nothing to do with what happened with the exploit later.

     

    People who were using a Piriform product which was set to check for updates could have also triggered alarms from their av's when the updater contacted the Piriform servers.

    Good to hear Avast provided protection!

  14. I have been using Avast for the last 11 months and today I received an email saying it expires this month.

    I understand this message is probably sent to encourage me to move to the paid version, but I am quite happy with the free one.

    Does anyone know if I have to delete my present version of Avast, using add/remove programmes, and then download Avast free antivirus again, or can I use the same method, as with CCleaner, which is to update without removing the other, or older, version?

  15.  

     

    If you look in the Control Panel at Add/Remove Programs and you see the application can not only be uninstalled but also "Changed" or "Repaired",

    I may have kept this thread going too long, but the point I was trying to make, latterly, was that the Avast installer does not appear in Add/Remove programmes. What does appear is Avast Antivirus itself and I do not want to uninstall that.

    If the Avast installer had appeared in Add/Remove I could have removed it from there if that was what I had wanted to do!

  16. Once you've installed a program (by running its installer), you can then delete the installer. Programs don't need the installer to still be in the system in order to work. Or you could keep it if you like. If you can easily re-download the installer from an online source (like at filehippo, etc.), it makes sense to just dump the used installer.

    That is clear enough and I can simply get rid if the installer, if I wish, by sending it to the trash bin.

    And thanks to all those who responded with information including login123 whose last post I have just noticed.

  17. You are not clicking on an icon.

    You are clicking on an object which has an associated icon.

    The nature of the icon is what controls the "Properties".

    Hello Alan_B. I assume your post refers to my last post, but I think you have lost me!

    All I wanted to know was whether there was any good reason for retaining the Avast installer on my computer, once I had downloaded Avast Anti Virus, and If there was no reason what was the simplest way of uninstalling it. I was not absolutely sure, but I thought the best method would be to send the installer desktop icon, and therefore the installer itself given that it was downloaded to my desktop, to the trash bin.

    This is basically what cc1 said in an earlier post!.

  18. Whatever icon you "right click" on, you can choose Properties and then choose "Open File Location". The highlighted icon in that new open window will be the actual file. (Watch out you don't accidentally highlight another file when that window opens. Scoot your cursor to the screens' edge before it opens.)

    i know these are basic questions, but if I right click the Installer Icon and then click "Properties" I get the information I mentioned in my last post. If I right click the Installer Icon and then click "Open" the installer wants to download Avast again.

    If I click "Properties" I do not see anything called "Open File Location". I assumed that the information I already received when I clicked "Properties" told me the installer file, itself, was saved on my desktop.

  19. Hi Northerner. You're correct; right clicking the installer icon and selecting delete accomplishes the same purpose as dragging it to the trash bin.

     

    If I'm reading through this thread correctly, you downloaded and saved the installer directly to your desktop. So, the icon appearing on your desktop is not just a shortcut to a file (the installer) saved somewhere else on your system. Instead, the installer file itself is saved on your desktop and it is identified by the icon. You can verify this by right clicking on the icon and selecting Properties. If this is just a shortcut icon, then the size will be very small...like a couple of hundred bytes. But if it's the actual installer file, then the size will be larger. Also, at least on Windows XP, shortcut icons have a small arrow in the lower left-hand corner.So assuming this icon in not a shortcut to the installer file, but rather the installer file itself, deleting it will delete the installer file.

     

    .

     

     

     

    When I select properties "Size on disc" is given as 56.2MB and the location is given as C:\Documents and Settings\My name\Desk. So I assume deleting the icon will delete the installer file.

    Also the icon does not appear to have the small arrow.

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.