[9828] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Shades of FV's Nathaniel Borenstein: Carnivore's "Magic

daemon@ATHENA.MIT.EDU (Greg Broiles)
Wed Nov 21 16:18:02 2001

Message-Id: <5.1.0.14.2.20011121125027.0485cec0@bivens.parrhesia.com>
Date: Wed, 21 Nov 2001 12:54:22 -0800
To: <pasward@big.uwaterloo.ca>
From: Greg Broiles <gbroiles@parrhesia.com>
Cc: Digital Bearer Settlement List <dbs@philodox.com>,
	dcsb@ai.mit.edu, cryptography@wasabisystems.com
In-Reply-To: <15355.51931.911993.467195@tolstoy.uwaterloo.ca>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed

At 10:40 AM 11/21/2001 -0500, pasward@big.uwaterloo.ca wrote:

>In the same vein, but a different application, does anyone know what
>the state of the art is for detecting such tampering?  In particular,
>when sitting at a PC doing banking, is there any mechanism by which a
>user can know that the PC is not corrupted with such a key logger?
>The last time I checked, there was nothing other than the various
>anti-virus software.

I have not used them, but you might find these of interest, all for Windows 
systems -

Spycop <http://spycop.com>
Hook Protect or PC Security Guard 
<http://www.geocities.com/SiliconValley/Hills/8839/utils.html>

I note that the latter URL loads a page which Bugnosis 
<http://www.bugnosis.org> identifies as containing possible "web bug" 
single-pixel images and complicated cookies.


--
Greg Broiles -- gbroiles@parrhesia.com -- PGP 0x26E4488c or 0x94245961
5000 dead in NYC? National tragedy.
1000 detained incommunicado without trial, expanded surveillance? National 
disgrace.




---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post