Kelogger

Discussion in 'Malware Help (A Specialist Will Reply)' started by Pr!nceSs, Mar 15, 2006.

  1. Pr!nceSs

    Pr!nceSs Private E-2

    Re: Weatherbug

    Um I don't think I'm in the right section?
    I DESPRETLY need help.
    I have an unwanted KEY LOG on my computer from an over controlling ex. I have no idea what it looks like of how to find and uninstall it..
    To make things worse I touch computers I seem to do accidental damage LOL
    Can any one help me plz?
     
  2. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    Re: Weatherbug

    Welcome to Majorgeeks!

    Do you mean from an ex employer?
     
  3. Pr!nceSs

    Pr!nceSs Private E-2

    No ex as in BF I just realllllllllly want it gone can any1 give me a step by step?:eek:
     
  4. chaslang

    chaslang MajorGeeks Admin - Master Malware Expert Staff Member

    There may not be too much we can do about this if it is one of the better commercial packages that are out there. Normally you need to have the person who installed it, uninstall it. They are typically protected and totally hidden from view. What I would suggest is that you run ALL of the standard cleaning steps below and attach the requested logs. From that, we will see what we can do.

    Please follow our standard cleaning procedures which are necessary for us to provide you support. Also there are steps included for installing, running, and posting HijackThis logs as attachments.

    - Run ALL the steps in this Sticky thread READ & RUN ME FIRST Before Asking for Support

    Make sure you check version numbers and get all updates.

    - Very Important: Make sure you tell us the results from running the tutorial...was anything found? Were you unable to complete any of the scans?...Were you unable to download any of the tools?...Did you do the on-line scans as suggested? etc.


    After doing ALL of the above you still have a problem make sure you have booted to normal mode and run the steps in the below link to properly use HijackThis and attach a log:

    Downloading, Installing, and Running HijackThis


    When you return to make your next post, make sure you attach the following logs and that you have run these scans in the following order too (these scans are covered in steps 6 & 7 of the READ & RUN ME sticky)
    • Bitdefender
    • Panda Scan
    • HijackThis
    .
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds