TIP: Click on subject to list as thread! ANSI
echo: alt-comp-anti-virus
to: ALL
from: VANGUARDLH
date: 2014-11-16 04:56:00
subject: Re: any reason why this w

Muse Gruppes wrote:

> http://filehippo.com/download_antilogger
> 
> I never saw it before, seems pleasant enough... anyway, probably 
> overkill for me since people would be very bored seeing a post-it

Where they are:
https://goo.gl/maps/eh6hx

Have you run its installed files (not just its installer file) through
VirusTotal?

They have a link to a Softpedia review (author's credibility unknown)
but is an over 4-year old article.  Hardly anything you want to
reference in trying to promote your product today.  From the current
description of the Nov 2014 version of the software, "Once installed,
Zemana AntiLogger Free instantly captures and encrypts every key you
press, including combinations with CTRL or ALT."  So it is itself a
keylogger that hopes to position itself in the system API before other
keyloggers.  Seems to be a product that availed itself of how malware
works similarly to how MsgTag availed themselves of using web beacons
employed by spammers.  There are no usable user reviews at the Softpedia
site, just a bunch of boobs (perhaps the same one) that merely clicked
on the stars rating and never bothered to actually write a review.
There are some user reviews over at download.com (look at the free
version at Cnet, not the payware version to which Zemana links to at
Cnet).

Their link to a TopTen review is worthless.  Never trust reviews from
that site.  It's a fake review site (along with all their other-named
fake review sites).  They exist to sell you stuff, not to educate you.
As is typical with them, they don't datestamp their articles so you have
no clue as to whether the article is relevant to the product today.  As
such, figure the info is antiquated.

Have you tested Zemana AntiLogger Free to determine if it does what it
claims?  No, I don't mean just Zemana's own simulation test.  I
downloaded the .zip file for their simulator and extracted the files
which were submitted to VirusTotal.  8 AV programs flagged it as a
keylogger.  So they want to run a keylogger on your host to test if your
current security setup will detect it.  Well, I've got recent backups
plus I can use Acronis TrueImage's Try&Decide (similar to Returnil).  I
ran their simulator and, yep, it captured the keyboard.  Couldn't get it
to capture the screen or Windows clipboard.  However, this really isn't
unexpected.  There are keyloggers that users themselves install, like
parents or employers, to watch what happens on THEIR property.  I'm
using Avast Free, MalwareBytes Anti-Exploit (free), and WinPatrol (free)
and they did not alert when I loaded or enabled Zemana's keylog tester.
A scan using MalwareBytes Anti-Malware (free) didn't detect the Zemana
keylog tester.  So either these products miss this keylogger (it may be
considered commercialware or overtly excluded) or it is not considered a
malicious keylogger.

I saw some other security products were mentioned (closed that web
browser tab so don't remember where) as incompatible with this product.
I've seen mention that it is incompatible with HitmanPro.Alert (which I
experienced personally is incompatible with MalwareBytes Anti-Exploit).
Zemana added some kind of SSL protection for https, ftps, pops, imaps,
etc (www.zemana.com/product/antilogger/modules/anti-ssllogger.aspx);
however, Avast added HTTPS scanning so I don't know if those would
conflict with each other.  Avast installs its own root cert into your
local certificate store so it can do a man-in-the-middle interrogation
of your HTTPS traffic.  For Zemana to look inside your SSL secured
traffic probably means they also install a root cert in your local
certificate store (run certmgr.msc and look under Trusted Root
Certificate Authorities).  Zemana says some games may have a problem
with their anti-keylogger.  You're supposed to report such problems at
http://www.zemana.com/support/ProductFeedBack.aspx.  However, if, as
they claim, they work at the kernel-mode level and somehow prevent other
keyloggers doing the same, then why would there be known game conflicts?
If you have any hotkey combos that include the Shift key, they will
cease to function.  They will encrypt the keystrokes, even those with
Shift in their sequence.  They say you'll have to change all shortkeys
to eliminate including Shift and only use Alt or Ctrl.  Their product is
not problem free.

http://www.zemana.com/product/antilogger-free/overview/ shows what the
free version lacks.  Not all features are listed.  For example, it is
unclear from the short comparison list if the SSL anti-logger module is
included in the free version.  I did find in their FAQs that SSL
anti-keylogging is NOT included in the free version.  It definitely
shows that the free version won't prevent the malware from running and
relies on encrypting your keyboard scancodes (but whether that is from
the keyboard - which seems unlikely since this is a software program,
from the keyboard device interface defined in the OS to the system
calls, or from the OS to the apps).  They really don't reference an
independent test site to qualify the claimed protection of their
anti-keylogger program.  They don't even provide a list of keyloggers
and their versions to show which ones their anti-keylogger will detect
or thwart; however, they do claim "In theory yes, but we handle keys at
the deepest place in the kernel. We have tested against all public
kernel level rootkits with keylogging capabilities, and none were able
to capture keystrokes."

This is one of those security programs that may be easy to use but may
also require some deep troubleshooting if operation isn't smooth.
Rather than detect keyloggers, it attempts to circumvent them so it
doesn't rely on signatures to detect keyloggers.  It doesn't look like
the free version is worth deploying on a host with other security
softwares, especially since many of the touted standout features in
Zemana AntiLogger are only available in the payware version.  You only
get the anti-keylogger module in the free version.  That might be all
you need if you're concerned about malware or your parents or your
employer capturing your keystrokes.

You do know there are hardware keyloggers, right?  Some are USB dongles
to which the keyboard connects.  There are some that can be placed under
the keys inside the keyboard.  They are made to look like part of the
keyboard so you have to know what the internals of a keyboard should
look like.
--- NewsGate v1.0 gamma 2
* Origin: News Gate @ Net396 -Huntsville, AL - USA (1:396/4)

SOURCE: echomail via QWK@docsplace.org

Email questions or comments to sysop@ipingthereforeiam.com
All parts of this website painstakingly hand-crafted in the U.S.A.!
IPTIA BBS/MUD/Terminal/Game Server List, © 2025 IPTIA Consulting™.