[9828] in cryptography@c2.net mail archive
Re: Shades of FV's Nathaniel Borenstein: Carnivore's "Magic
daemon@ATHENA.MIT.EDU (Greg Broiles)
Wed Nov 21 16:18:02 2001
Message-Id: <5.1.0.14.2.20011121125027.0485cec0@bivens.parrhesia.com>
Date: Wed, 21 Nov 2001 12:54:22 -0800
To: <pasward@big.uwaterloo.ca>
From: Greg Broiles <gbroiles@parrhesia.com>
Cc: Digital Bearer Settlement List <dbs@philodox.com>,
dcsb@ai.mit.edu, cryptography@wasabisystems.com
In-Reply-To: <15355.51931.911993.467195@tolstoy.uwaterloo.ca>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
At 10:40 AM 11/21/2001 -0500, pasward@big.uwaterloo.ca wrote:
>In the same vein, but a different application, does anyone know what
>the state of the art is for detecting such tampering? In particular,
>when sitting at a PC doing banking, is there any mechanism by which a
>user can know that the PC is not corrupted with such a key logger?
>The last time I checked, there was nothing other than the various
>anti-virus software.
I have not used them, but you might find these of interest, all for Windows
systems -
Spycop <http://spycop.com>
Hook Protect or PC Security Guard
<http://www.geocities.com/SiliconValley/Hills/8839/utils.html>
I note that the latter URL loads a page which Bugnosis
<http://www.bugnosis.org> identifies as containing possible "web bug"
single-pixel images and complicated cookies.
--
Greg Broiles -- gbroiles@parrhesia.com -- PGP 0x26E4488c or 0x94245961
5000 dead in NYC? National tragedy.
1000 detained incommunicado without trial, expanded surveillance? National
disgrace.
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com