PureBytes Links
Trading Reference Links
|
It's possible, but equally likely is that these are injecting their
own .DLLs into their own processes with a global hook. This stuff is
over my head, but global hooks are also the most common technique used
by wild keyloggers. A good firewall will spot global hooks; the tough
thing is recognizing which ones are legitimate.
The array of exploits (or "leaks") available to trojans is really
quite scary. A white paper which describes many of the techniques can
be found at
http://www.personalfirewall.comodo.com/Comodo_Firewall_2.3_vs_The_Leaktests.pdf
> Just a wild guess, but maybe it's because some programmer built a
> key-logger into it :)
>> Online-Armor is v.useful, however its listing TS 8.3 file
>> TSSupp.exe and Orchart.exe as key loggers? Do any of you network
>> chaps know why that might be?
>>> I recently received this link to some firewall test results. Very
>>> comprehensive and eye opening.
|