How Do I Bypass Keyloggers? The Guaranteed Way to Avoid Having Your Keystrokes Maliciously Recorded

Sdílet
Vložit
  • čas přidán 22. 08. 2024

Komentáře • 78

  • @BimmerWon
    @BimmerWon Před 2 lety +5

    I have a new idea of how to bypass key loggers but I don’t know if the technology exists yet. What if you could install an external device to your computer that monitors all outgoing information and forces you to manually review it before sending it out? That would be a real pain in the ass to deal with but it could potentially work I think. Perhaps instead you could have a device that stores all your passwords encrypted and compares them to outgoing information to see if anything contains your passwords. It could also automatically block screenshots you didn’t manually initiate being sent or trigger a 2 factor authentication for you to send it. You could also implement facial recognition software or some sort or timeout feature that automatically disconnects your computer from the internet with a physical servo switch when you are away from it so no one can take control of your computer. Of course it’s best to keep you computer clean of malware but sometimes smart viruses can hide from detection so it’s better to take more precautions.

  • @Roberto11231
    @Roberto11231 Před 2 lety +4

    Thanks for the subtitles. Many of us who are from Latin America and want valuable information that is in English, we cannot know how to solve something because of the language.
    Hopefully the Spanish subtitling of the English videos will be more frequent on CZcams. Excellent video!

  • @YoSoyFabrizioyTuNo
    @YoSoyFabrizioyTuNo Před 4 lety +12

    The best advice. Do what you always should do to be secure. Thanks Leo for stating the obvious, again.

    • @askleonotenboom
      @askleonotenboom  Před 4 lety +7

      You. Would. Be. Socked. at how many people do not. And how many people are hyper-focused on bypassing keyloggers without realizing that they're just malware, and doing what you should already be doing is all you can do to bypass them to begin with.

  • @bizzhat
    @bizzhat Před 4 lety +6

    wow. that was interesting!
    Question:
    if a key-logging malicious programm were to upload screenshots online (or any data for that case), would that not be noticeable by the size of data uploaded? -or can said programm somehow compress the information automatically (if that were the case, in itself, that is pretty cool, however bad).
    Thanks.

    • @askleonotenboom
      @askleonotenboom  Před 4 lety +3

      Of course it could compress, but honestly with today's higher-speed internet connections I could see even uncompressed data not being noticed unless you were really paying attention.

  • @hodonkain
    @hodonkain Před 10 měsíci

    Thank You. This means only 1 logical problem... The operating system is flawed. They operating system needs to be able to be verified for integrity and separated from user files and unchangeable. Having a Linux Live CD could be useful but one would need to invest time and money into a good firewall, both hardware and software. It looks like we have a lot to go for information safety and security in the coming years. Great video!

  • @uphillwish
    @uphillwish Před 2 lety +1

    The best way is to (1) back up you entire clean OS drive (c:) every other week, (2) be sensitive to know you computer is infected, and (3) restore you entire OS drive upon sensing something is weird. DO NOT CLICK spooky free gift offer at CZcams comment area. If you click it, keylogger will be installed along with batch file to install other virus'.

  • @downkoadRumble
    @downkoadRumble Před rokem +1

    Damn dude this scard the shit out of me. I just a brand new MacBook and I installed Firefox and hardened all of its settings and hardened my firewall. I hope I'm good

  • @lrwright8400
    @lrwright8400 Před rokem

    Thanks for breaking this down in a simple way!!

  • @Joniyah444
    @Joniyah444 Před 2 lety

    I’ve read that key loggers can come from bad web pages, pushing and pushing okay on pop up links to disappear. This could be a danger on an iOS device like iPad or iPhone? I reset everything and changed passwords

  • @charlessmith263
    @charlessmith263 Před 6 měsíci

    Can a keylogger plant a virus into any MS Word file that starts with a tilde + filename?
    MS Word files that have a tilde before the real filename, if I have a sixth sense of cybersecurity, can be dangerous on a C drive and need to be jettisoned. For one thing, these files can be already corrupted, whether it is likely through a keylogger that causes the unforgiving "tildes" or whatever! These are my two bits.

    • @askleonotenboom
      @askleonotenboom  Před 6 měsíci

      Those are word temporary files. They normally appear only while Word is open. If they're left after it's usually because Word didn't shut down properly. They're not malicious, but they can be safely deleted.

  • @detective4719
    @detective4719 Před 3 lety +1

    Hi Leo, great video. Do recommend using anti key logging software such as spyrix? Seems like your saying that this software really isn't efficient and that the best thing to do is have anti virus software to eliminate malware. Do you have any recommendations on what to use to protect Mac computers?

    • @askleonotenboom
      @askleonotenboom  Před 3 lety +2

      As the video goes to great lengths to point out: anti-keylogging software is a waste, since keyloggers can log MUCH more than just keys. Sorry, don't have a specific mac recommendation at this time.

    • @detective4719
      @detective4719 Před 3 lety +2

      @@askleonotenboom thanks, I take away that point from the video just wasn’t clear on if there was any benefit to using one at all. I’ve been using cleanmymac to check for viruses and malware but I’m not sure if that is enough. Do you recommend any software for mac?

  • @micahpendleton5236
    @micahpendleton5236 Před 2 lety +1

    The age of security and privacy is gone

  • @nedludd7622
    @nedludd7622 Před 6 měsíci

    What do you think of software like Keyscrambler?

  • @RAPTOR8ASDF
    @RAPTOR8ASDF Před rokem

    Hey Leo. In your opinion, would the following setup avoid installing Key/Screen loggers 100%?
    Get a new PC. Assume it is 100% free of key/screen loggers. Now use it ONLY to access known good websites like one's bank, credit card, medical and other "trusted" websites ONLY. Never do email or searches using that PC. Can do Office stuff like word processing and spreadsheets but locally only... never going on the internet. Any flaws in this scenario? Your opinion please. Thanks.

    • @askleonotenboom
      @askleonotenboom  Před rokem

      I will never, ever, say 100% for anything. There's no such thing as perfection, and you can never let your guard down. You haven't mentioned security software, which is still required, nor how you'll get the documents you're working on to and from the machine. That being said, it feels good, but there's no such thing as 100%.

    • @RAPTOR8ASDF
      @RAPTOR8ASDF Před rokem

      @@askleonotenboom Thank you for taking the time to reply. Really appreciated! I will subscribe to your channel. ----- The DEDICATED PC (no email or Googling) will be running an anti-virus, maybe BitDefender paid (My laptop which I do email and Googling that's running Win10 defender was infected by a keylogger that was found via a scan. I will be restoring a known good backup to that laptop and then installing BitDefender.). ----- Word processing (Writer) and spreadsheet (Calc) documents would be created on the DEDICATED PC and and saved on a "new" USB3 flash drive in an encrypted container using VeraCrypt with strong password. Flash drive only plugged into the PC while in use, otherwise stored in a safe that's bolted to the floor to protect against theft. Contents of flash drive copied to a 2nd new flash drive before removal to always have a minimum of 2 copies. ----- Bank web pages and writer/calc documents printed by a networked connected laser printer. ----- About the best plan I can think of to protect financial and sensitive data from key/screen loggers. ----- Pro or con comments about plan or BitDefender welcome.

  • @fjack1588
    @fjack1588 Před 4 lety +1

    I have always assumed that a password manager and automatic login bypass keystroke logging. Hmm, do automatic logins with like LastPass handshake and then send encrypted passwords?

    • @askleonotenboom
      @askleonotenboom  Před 4 lety +1

      All password managers simply mimic keystrokes, so they're all absolutely susceptible to keystroke logging (or whatever else malware cares to log). There is NO encrypted private handshake or anything like that.

  • @meepmeepp4590
    @meepmeepp4590 Před rokem

    Question dose the hub have keyloggers

  • @peterkwolek2265
    @peterkwolek2265 Před 2 lety

    OSK will bypass “dumb/hardware” key loggers, I may or may not have done some private investigation work and may or may not have gone with hardware that’s simple/no malware to bypass all antivirus. Since device was 100% passive simply logging what it sees on the USB I attached it to.

    • @peterkwolek2265
      @peterkwolek2265 Před 2 lety

      Good network security is important aswel, if every security on your PC is breached a good network traffic monitor might save you. (Seeing/blocking data upload to malicious 3rd party.)

  • @avafull
    @avafull Před 3 lety

    Can those details be sent to a specific email? If so, is there a possibility to check who installed it by that email?

    • @askleonotenboom
      @askleonotenboom  Před 3 lety

      All I can say is "maybe". It really depends on ALL the specifics of the situation, and whether or not law enforcement has been involved.

  • @RCohle452
    @RCohle452 Před 3 lety +1

    The hardware keyloggers are even more insidious as they do not run any software and thus cannot be indexed by antivirus software.

    • @askleonotenboom
      @askleonotenboom  Před 3 lety +1

      Exactly. That's why I recommend never using a public computer, or even a friend's questionable computer, for anything improtant/secure/sensitive.

    • @RCohle452
      @RCohle452 Před 3 lety

      @@askleonotenboom some of these hardware keyloggers especially the ones that can be embedded in the usb keyboard are almost like something that the CIA or Mossad would use.

  • @redrobles3303
    @redrobles3303 Před 3 měsíci

    How's about a solution?

  • @darudeSandstorm.
    @darudeSandstorm. Před 2 lety

    Awesome vid!

  • @funiroxic9977
    @funiroxic9977 Před 2 lety

    This dude is acting like I wanted to get hacked and I just put the keylogger on my stuff

  • @JasonGamer25
    @JasonGamer25 Před 3 lety

    I have multiple HDDs attached to my PC and I seem to have been given some malware by a file some classmates sent me, is it possible to figure out which HDD has the logger so that it can be replaced or would I be better off replacing all my hardrives, it's sounds expensive but someone has already found my information and is constantly attacking me and purchasing things, I've cancelled card thinking that was the issue but it appears they they got access via my pc. Again I'm a student so I only download software like Photoshop or Zbrush which are industry wide program so I doubt I got malware from that, and the only other files I open and download are from my profs and classmates. Please help. I've tried completely factory resetting the PC and fresh installing windows but it didn't seem to help

  • @lifeisbeautiful5998
    @lifeisbeautiful5998 Před 3 lety

    Hey ..I am.using getintopc ...there might be virus in my sofware .
    What to do to safe myself ??

  • @norrinradd8923
    @norrinradd8923 Před 3 lety

    But if your password is saved on web browser it should bypass any key stroking, renders screenshots useless and malware affecting clipboard will be ineffective.......

    • @askleonotenboom
      @askleonotenboom  Před 3 lety +2

      This is flat out WRONG. Malware can intercept anything, it can intercept the transfer of the password to the website. And, you know how that's done most often? BY SIMULATING KEYSTROKES. So a saved password is easily EASILY captured by keystroke loggers.

  • @wraithje
    @wraithje Před rokem

    yall, keyloggers wont coem up in anti viruses, because keyloggers usually use software that are valid and not a malware

    • @askleonotenboom
      @askleonotenboom  Před rokem

      Not true. Most malicious keyloggers are indeed classified as malware and detected by up-to-date anti-malware tools. There are so-called "legitimate" keyloggers, in the form of parental monitoring, or employee monitoring software that is not classified as malware.

  • @tlouik
    @tlouik Před 2 lety

    There is one solution.....dual or live booting another operating system that doesn't have a keylogger.

  • @peterkwolek2265
    @peterkwolek2265 Před 2 lety

    This is why passwords are so last decade, any company using username password needs to fix themselves. (I understand it’s a long list)

  • @KierownikFestynu
    @KierownikFestynu Před 2 lety

    Hi, what about Anti-Keylogger software like SpyShelter Firewall?

    • @askleonotenboom
      @askleonotenboom  Před 2 lety

      What about it? My video comments still apply. If you let malware on your machine it can do ANYTHING.

    • @KierownikFestynu
      @KierownikFestynu Před 2 lety

      @Ask Leo! Hi Leo, this app can prevent malware infection in the first place, thanks to very strong proactive protection and build in virusscan jotti. In addition it has restricted mode for vulnerable apps and can stop many keyloggers actions like screen shoots, keystroke capture etc for me works well with second opinion scanner for many years.

  • @moraai6263
    @moraai6263 Před 2 lety

    Just saying, a virus stealing the clipboard or password manager is no longer a key logger. That’s just malware

    • @askleonotenboom
      @askleonotenboom  Před 2 lety

      I'll put it the other way: a key logger is also just malware.

  • @Afroninja2025
    @Afroninja2025 Před 2 lety

    Thxs all the comments, I avoid wasting time on this. Clickbeit

  • @jennyli1468
    @jennyli1468 Před 3 lety

    What is a good strong keylogger to monitor all the above you were saying including private browsers, deleted histories, and apps? It's a great device to monitor your trouble making kids.

    • @askleonotenboom
      @askleonotenboom  Před 3 lety

      I don't have a recommendatation. Sorry.

    • @moraai6263
      @moraai6263 Před 2 lety +1

      Um just don’t. Make sure to trust your kids, and tell them the risks about online activity. If anything, use a blocker that blocks innapropriate or violent websites, but no monitoring is necessary. Remember, it is illegal to give someone +18 a keylogger, and it should be the same for kids

  • @buatsubs3961
    @buatsubs3961 Před 2 lety +2

    looong talking with no solution 🤣

    • @Mo-W-23
      @Mo-W-23 Před 2 lety +2

      A waste of bloody time.

  • @iRocz.
    @iRocz. Před 2 lety

    This video literally showed me nothing to do with the title of the video smh

    • @askleonotenboom
      @askleonotenboom  Před 2 lety +1

      On the contrary, it makes in important point: YOU CAN'T.

  • @jamesstat
    @jamesstat Před 3 lety

    How can you scramble keystrokes for iPhones?

    • @askleonotenboom
      @askleonotenboom  Před 3 lety

      To the best of my knowledge a) you can't and b) there's no point.

  • @JamesBond-iv4eh
    @JamesBond-iv4eh Před 2 lety

    His advice was don’t have malware on your system like duuuuhhhhhhh how tf do I get rid of it?

    • @askleonotenboom
      @askleonotenboom  Před 2 lety

      What I also said: run up-to-date anti-malware scans. It's just malware. More: askleo.com/how_do_i_remove_malware/

  • @flippopotamuss
    @flippopotamuss Před 2 lety

    So the point of this video was to watch a different video?

    • @askleonotenboom
      @askleonotenboom  Před 2 lety

      No, the point was to explain that common "solutions" to bypassing keyloggers aren't solutions at all.

  • @PullinMyOwn
    @PullinMyOwn Před 3 lety

    Bro I came to your video to remove a Keylogger if I have one. How do I get rid of it??

    • @askleonotenboom
      @askleonotenboom  Před 3 lety +1

      You treat it like any other malware: czcams.com/video/DXrPPra-yBU/video.html

    • @PullinMyOwn
      @PullinMyOwn Před 3 lety

      @@askleonotenboom I am on a Mac. Any difference?
      I followed another video that had me update my computer, delete extensions, I also run Avast and another one. It didn't really come up with anything but the ReiKey program showed a Keylogger outside of the apple systems.

    • @askleonotenboom
      @askleonotenboom  Před 3 lety

      @@PullinMyOwn I don't have specific recommendations for the Mac, but the concept is still very very true: malware can do anything. There is no guaranteed reliable way to "bypass" a keylogger. What's critical is you don't allow malware on your machine to begin with, regardless of it being a PC, a Mac, or something else.

    • @PullinMyOwn
      @PullinMyOwn Před 3 lety

      @@askleonotenboom well I ran Malwarebytes last night and it didn't have anything. The only reason I suspected there to be an issue was my boss said the website got hacked after I logged in.
      I ran Avast and Malwarebytes. Both don't show any issues. Am I clear now?

    • @askleonotenboom
      @askleonotenboom  Před 3 lety

      @@PullinMyOwn There's simply no way to know for sure. You've done pretty much what I would have done, though.

  • @DagaanGalakticos
    @DagaanGalakticos Před 2 lety +1

    Good advice. Could have been shorter. Subbed.

  •  Před 3 lety

    Is the keyscrambler from qfxsoftware safe software? :'v don't hug me i'am scared from malware :'v

    • @askleonotenboom
      @askleonotenboom  Před 3 lety

      No idea, but as the video points out those types of tools are useless.

  • @carlbowles1808
    @carlbowles1808 Před 2 lety

    🥶😲😱😈

  • @lIIl_lIl_lIIl
    @lIIl_lIl_lIIl Před 2 lety

    let me save you 8 minutes of your life... (if he doesn't delete the comment🙄)
    zero answer, just rambles for ad revenue🤑
    ends the video with "you cant"🥱

    • @askleonotenboom
      @askleonotenboom  Před 2 lety

      If by "rambling" you mean "explains why keyloggers are no different from other malware, and can log MUCH more than just keystrokes, and that you treat them like any other malware" ... you're absolutely right. Thanks!