How can I identify a keylogger on my computer?

Hi, here's my issue.
Recently, I stumbled upon a youtube video with a link, whose intention (unbeknownst to me) was to phish a password. It looked very legitimate initially, almost identical to the official page, and asked me for an in-game name/password to see something. I entered my username and password, and immediately afterwords realized what had just happened and scrambled to quickly change my password.
I am now afraid of the possibility of a keylogger having been installed when I clicked the link, which makes me afraid to type in that username/password again, let alone credit cards or other personal information.
I don't know how I would go about identifying a keylogger if I had one. Here is my current process list, but I don't know if some sort of stealthy keylogger could dodge appearing on this list, or if that's even possible. I am also running a virus scan, but I would assume there exist keyloggers sophisticated enough to escape that.
34865
Activity Monitor
Nick
1.8
4
16.4 MB
Intel (64 bit)
34868
activitymonitord
root
0.6
1
1.5 MB
Intel (64 bit)
56
aosnotifyd
root
0.0
2
1.9 MB
Intel (64 bit)
55
applepushserviced
root
0.0
3
4.2 MB
Intel (64 bit)
3964
AppleSpell.service
Nick
0.0
2
7.4 MB
Intel (64 bit)
14652
AutoClicker
Nick
0.0
2
6.1 MB
Intel (64 bit)
53
autofsd
root
0.0
2
1.3 MB
Intel (64 bit)
33790
bash
Nick
0.0
1
648 KB
Intel (64 bit)
52
blued
root
0.0
3
2.7 MB
Intel (64 bit)
187
com.apple.dock.extra
Nick
0.0
2
6.2 MB
Intel (64 bit)
14
configd
root
0.0
7
4.0 MB
Intel (64 bit)
35982
cookied
Nick
0.0
2
1.4 MB
Intel (64 bit)
134
coreaudiod
_coreaudiod
0.0
4
3.6 MB
Intel (64 bit)
62
coreservicesd
root
0.0
4
11.4 MB
Intel (64 bit)
106
CVMServer
root
0.0
1
664 KB
Intel (64 bit)
5922
DashboardClient
Nick
0.0
9
16.6 MB
Intel (64 bit)
13
diskarbitrationd
root
0.0
2
1.6 MB
Intel (64 bit)
35971
distnoted
_spotlight
0.0
2
1.4 MB
Intel (64 bit)
147
distnoted
Nick
0.0
4
3.4 MB
Intel (64 bit)
19
distnoted
root
0.0
3
1.7 MB
Intel (64 bit)
154
Dock
Nick
0.0
3
17.6 MB
Intel (64 bit)
46
dynamic_pager
root
0.0
1
296 KB
Intel (64 bit)
34938
eapolclient
Nick
0.0
3
1.8 MB
Intel (64 bit)
5894
filecoordinationd
root
0.0
2
1.6 MB
Intel (64 bit)
33801
Finder
Nick
0.0
7
55.0 MB
Intel (64 bit)
212
Firefox
Nick
8.4
57
778.6 MB
Intel (64 bit)
214
Firefox Plugin Process (Shockwave Flash)
Nick
8.6
26
119.9 MB
Intel (64 bit)
161
fontd
Nick
0.0
2
4.2 MB
Intel (64 bit)
15
fseventsd
root
0.1
26
6.3 MB
Intel (64 bit)
8176
GrowlHelperApp
Nick
0.0
5
7.8 MB
Intel (64 bit)
44
hidd
root
0.0
3
1.4 MB
Intel (64 bit)
170
imagent
Nick
0.0
2
2.8 MB
Intel (64 bit)
33701
imklaunchagent
Nick
0.0
2
1.4 MB
Intel (64 bit)
3556
InterCheck
root
3.5
25
165.4 MB
Intel
20315
iTunes
Nick
0.0
17
53.5 MB
Intel (64 bit)
20322
iTunes Helper
Nick
0.0
3
3.2 MB
Intel (64 bit)
0
kernel_task
root
2.1
90
413.7 MB
Intel (64 bit)
42
KernelEventAgent
root
0.0
3
552 KB
Intel (64 bit)
10
kextd
root
0.0
2
3.2 MB
Intel (64 bit)
1
launchd
root
0.0
3
1.6 MB
Intel (64 bit)
35965
launchd
_spotlight
0.0
2
924 KB
Intel (64 bit)
142
launchd
Nick
0.0
2
1.0 MB
Intel (64 bit)
33789
login
root
0.0
2
956 KB
Intel (64 bit)
116
logind
root
0.0
2
1.3 MB
Intel (64 bit)
40
loginwindow
Nick
0.0
5
32.4 MB
Intel (64 bit)
33817
lsboxd
Nick
0.0
2
1.9 MB
Intel (64 bit)
168
mdmclient
Nick
0.0
2
2.1 MB
Intel (64 bit)
38
mdmclient
root
0.0
2
2.0 MB
Intel (64 bit)
37
mDNSResponder
_mdnsresponder
0.0
3
3.0 MB
Intel (64 bit)
36
mds
root
0.5
8
28.7 MB
Intel (64 bit)
35969
mdworker
_spotlight
0.0
3
6.0 MB
Intel (64 bit)
27976
mdworker
Nick
0.1
4
17.6 MB
Intel (64 bit)
225
Microsoft AU Daemon
Nick
0.0
2
2.2 MB
Intel
5907
Microsoft Excel
Nick
0.1
13
44.6 MB
Intel
25982
Microsoft Word
Nick
0.3
6
33.6 MB
Intel
180
MicrosoftMouseHelper
Nick
0.0
2
3.1 MB
Intel (64 bit)
101
netbiosd
_netbios
0.0
4
2.9 MB
Intel (64 bit)
12
notifyd
root
0.0
3
984 KB
Intel (64 bit)
21
ntpd
root
0.0
1
836 KB
Intel (64 bit)
17
opendirectoryd
root
0.0
9
6.6 MB
Intel (64 bit)
153
pboard
Nick
0.0
1
256 KB
Intel (64 bit)
18
powerd
root
0.0
2
1.9 MB
Intel (64 bit)
35963
quicklookd
Nick
0.0
8
35.1 MB
Intel (64 bit)
32
revisiond
root
0.0
4
1.8 MB
Intel (64 bit)
35957
ScanLauncher
root
0.4
7
2.2 MB
Intel
29
securityd
root
0.0
4
3.0 MB
Intel (64 bit)
32658
Skype
Nick
0.0
27
55.8 MB
Intel
57
SophosAntiVirus
root
0.6
13
3.6 MB
Intel
3097
SophosAutoUpdate
root
0.0
4
5.9 MB
Intel
35958
SophosAVAgent
root
100.1
9
87.0 MB
Intel
3902
SophosManagementAgent
root
0.1
13
156.5 MB
Intel
58
SophosMessageRouter
root
0.1
17
7.2 MB
Intel
35549
SophosUIServer
Nick
0.5
6
7.2 MB
Intel
28
stackshot
root
0.0
3
648 KB
Intel (64 bit)
16
syslogd
root
0.0
4
880 KB
Intel (64 bit)
26
SystemStarter
root
0.0
2
640 KB
Intel (64 bit)
156
SystemUIServer
Nick
0.0
5
17.8 MB
Intel (64 bit)
155
talagent
Nick
0.0
2
3.6 MB
Intel (64 bit)
65
taskgated
root
0.0
2
2.3 MB
Intel (64 bit)
33787
Terminal
Nick
0.0
5
10.2 MB
Intel (64 bit)
14831
usbmuxd
_usbmuxd
0.0
3
1.7 MB
Intel (64 bit)
145
UserEventAgent
Nick
0.0
3
5.1 MB
Intel (64 bit)
11
UserEventAgent
root
0.0
5
4.0 MB
Intel (64 bit)
32660
VDCAssistant
root
0.0
4
4.0 MB
Intel (64 bit)
23
warmd
nobody
0.0
3
2.8 MB
Intel (64 bit)
164
warmd_agent
Nick
0.0
2
1.2 MB
Intel (64 bit)
96
WindowServer
_windowserver
1.0
11
66.6 MB
Intel (64 bit)

If this is it:
http://www.murgaa.com/auto-clicker-mac/
Justification for this thing is anyone's guess. Looks dumb but harmless:
Quit AutoClicker and its process disappears. No kernel extensions seem to have been installed or modified. It makes no attempt at outgoing connections.
I was more curious about eapolclient.

Similar Messages

  • I have very little space left on the hard drive on my macbook, on my storage report it says "other" is taking up more than two thirds of the space on the hardrive. How can I identify what these files are?

    I have very little space left on the hard drive on my macbook, on my storage report it says "other" is taking up more than two thirds of the space on the hardrive. How can I identify what these files are?

    Hello,
    There is free software you can download that gives you a graphical image of what files are used on your hard drive. http://www.derlien.com/
    This may help you clean down your hard drive for more space.
    Best of luck

  • How can I identify and delete duplicates on the latest version of itunes?

    How can I identify and delete duplicates on the lastest version of iTunes?

    The show duplicates/show exact duplicates features have been left out of iTunes 11. Rumor suggests they will be restored in the next build. In the meantime I have written two Windows scripts to make playlists of Duplicates and Exact Duplicates, either from a selection of tracks or the entire library. Note that, as with the iTunes feature, this list makes no distinction between "originals" and "dupes", you have to decide which is which.
    There is also my DeDuper script for automatically removing duplicate copies but keeping one remaining copy of each set. This can preserve ratings, play counts, playlist membership, etc. which are lost in a manual clean up. Please take note of the warning to backup your library before deduping. See this thread for background on deduping and the script.
    If you want to manually remove duplicate tracks use shift-delete to remove selected tracks from the library as well as the playlist. Keep one of each repeated group of files and don't send the others to the recycle bin unless you are sure that there are multiple files on the disc as opposed to multiple entries to the same file. Same advice to backup applies.
    tt2

  • How can L identify what are the not null fields of a table in a stored procedure ?

    How can L identify what are the not null fields of a table in a stored procedure ?

    You could query the data dictionary:
    SELECT column_name
    FROM all_tab_columns
    WHERE owner = '...'
    AND table_name = '...'
    AND nullable = 'N'

  • How can I identify and remove duplicate file (audio & photo)

    How can I identify and remove duplicate file (audio & photo)?  I have quite a few libraries created as backup files.

    Terence,
    Yes, the duplicates appear in the iPhoto window. I have folders with same name occuring two or even three times sometimes with exactly the same set of photos (ie photos with the same ID) and sometimes with a limited set of photos. Other  folders appear only once.
    I normally take my MacBook with me if I'm shooting a lot of photos, such as on holiday, and then want to transfer them to my iMac when i get home. Other times I transfer the camera's memory stick directly to my iMac.
    I have great difficulty transferring the photos from my MacBook to my iMac. I don't want to store my photos on my iDisk due to the length of time it takes to upload them.
    Thanks again.
    Simon

  • How can I identify "unrequested" downloads which arrive without appearing in the Downloads window

    Frequently during quiet periods while online, data downloads occur as can be observed by the data transfer indicator flashing on the modem. They have not been preceded by requests for updates, requests for specific downloads, or by announcements from any source. They usually resume if the modem is switched off for a while, and then switched on again. 50 MB has come down over the last half hour. There is usually no warning from my firewall and other security software, which does not mean that the downloads are definitely safe. This interferes with sensitive connections to banks, for instance. I have found no obvious clues while browsing folders, and there are many hidden folders in Windows 7. How can I identify the data online, preferably, or on my harddrive later ? Opening the Downloads window after the start of a session of mystery files does not help.

    See [[Firefox makes unrequested connections]]

  • How can i identify the environment name or database name in the PL/SQL code

    Hi,
    I am using UTL_FILE to genearate the files.,
    My problem is, I have to design the common sql file , which can be executed in 2 diffrent environments ( Say QA & DEV ) , with no parameters. It has to identify the environment and based on the environment , it has to generate the concern files.,
    The only change needs to be incorporated is , file names , which will change based on the environment.,
    can nay one tell me , how can i identify the environment name or database name in the PL/SQL code ??
    Raja

    In this case, USEC_GI_DEV.NA.XXXNET.NET is a TNS alias. That alias exists only on the client machine. There is no way to access that information on the database server.
    You would have to find something in the v$database or v$instance table that uniquely identifies the database (and you may need some help from the DBAs to do this because you need to ensure that the data element you choose is compatible with whatever refresh process(es) are used in your environment).
    Now, if you are writing a stand-alone SQL*Plus script, SQL*Plus, as a client tool, does have access to the TNS alias in later versions. But that is a client-side determination, not a server-side determination.
    Justin

  • How can we identify an employee termination date?

    how can we identify an employee termination date? using infotype(41) i 'mean which field.
    Please update me.

    Hi,
       Normally last working Day - date type 42 is used as the termination date.
    Regards,
    Manoj.

  • How can we identify idoc is generated from ale or edi

    hi friends,
    This is interview question asked in tcs,
    how can we identify idoc is generated from ALE or EDI.
    please give me reply if anybody knows
    thanks,
    hari priya

    Idoc created by ALE is a means of migrating DATA between SAP systems. You configure logical destinations, establish some migrating criteria and the system takes care of getting your data from point A to point B
    Where as Idoc created by EDI is described as the interchange of structured data according to agreed message standards between computer systems, by electronic means. Structured data equates to a simple and direct method of presenting the data content of a document. The method of ensuring the correct interpretation of the information by the computer system is defined by the EDI standard."
    EDI is a technique used to communicate business transactions between computer systems of different companies and organizations. Note that sometimes the EDI mechanism deployed at a company is often used to interface to other systems within the same organization."
    Also refer to these lonks:
    www.sapgenie.com/sapedi/edi_sap_training.htm
    www.sap-img.com/basis/ difference-between-edi-and-idoc.htm
    www.help.sap.com/saphelp_nw04/helpdata/ en/35/26b592afab52b9e10000009b38f974/content.htm
    www.help.sap.com/saphelp_nw04/helpdata/ en/35/26b594afab52b9e10000009b38f974/content.htm
    http://www.onestopsap.com/interview-Question/edi/
    IDocs act as data containers in an ALE scenario. They are just a format of storing application data and then transferred using ALE. Take a look at http://www.sapgenie.com/ale/why_ale.htm and http://www.sapgenie.com/sapgenie/docs/ale_whitepaper.doc for further details on ALE.
    Check this link.
    http://www.sapgenie.com/sapedi/idoc_abap.htm
    http://www.henrikfrank.dk/abapexamples/IDOC/IDOC.htm
    http://help.sap.com/printdocu/core/Print46c/en/Data/Index_en.htm
    http://help.sap.com/saphelp_47x200/helpdata/en/0b/2a6095507d11d18ee90000e8366fc2/frameset.htm
    Reward points if found helpful...
    Cheers,
    Chandra Sekhar.

  • How can I identify a business partner as rented address in WebUI?

    Hello,
    if you create business partners for a rented external list, then they are flagged as Rented Address in the business partner master data.
    How can I identify a business partner as rented address in WebUI? What is the relevant field?
    Thanks in advance.
    Best regards,
    ANVAN

    Hi Anvan,
    Component BP_HEAD
    Rented Adress flag is in context node MARKETING   (MARKETING/STRUCT.IS_RENTED).
    SAP GUI->tab Classification
    Regards
    Edited by: Meifo on Oct 26, 2010 12:30 PM

  • In Credit Management how can we identify the credit customers

    Hi SD Gurus,
    Could you please tell me, In Credit Management how can we identify the credit customers?
    and what are accounting entries?
    Thanks & Regards,
    Nivas

    You can refer Table KNKK with reference to Credit Control Area, you will get all the Customers maintained for Credit Management.
    There is no such Accounting Entries especially for Credit Management.It would be the same as comes while creating Invoice.
    Best Regards,
    Ankur

  • In Microsoft Service Manager how can I Identify that one Change Request is backed out or not.

    In Microsoft Service Manager how can I Identify that one Change Request is backed out or not.

    Hi,
    It seems that he means "Not Approved"
    Cheers,
    Marat
    Site: www.scutils.com  Twitter: LinkedIn:
    Graveyard:

  • My iphone 4 has came from Sweden,but i dont know its original carrier . plz help me how can i identify is carrier.

    My iphone 4 has came from Sweden,but i dont know its original carrier . plz help me how can i identify is carrier.

    Having the email address is not necessary. It is just the username for the device. All you need is that Apple ID and password. Now, if you forgotten the password, then you have more work to do. Since that email is no longer active, you would need to send the reset to your rescue email, if you remember that. Or you will need to contact Apple Security for help. Apple ID: Contacting Apple for help with Apple ID account security

  • ITunes forgets tracks - how can i identify them?

    I've just realized that iTunes has forgotten a number of music tracks!
    It is, of course, easy to add them again to iTunes.
    But the big question is: how can I identify all the tracks that satisfy the following two conditions:
    1. they are not in iTunes, and
    2. the files are in a subfolder of, say, ~/Music/Klassik?
    Any hints, ideas, suggestions will be highly appreciated!
    Best regards,
    Gabriel.

    This application will list the file paths of the files in your designated "iTunes Media" folder which are not in iTunes' library. Additionally, you can select a different parent folder and its contents will be compared to the iTunes library. Options to Add a selection of found files to iTunes or move them to the Trash.
    http://dougscripts.com/itunes/scripts/ss.php?sp=musicfolderfilesnotadded2

  • How can we identify

    hi
       can anybody tell me
    how can we identify valuated or non valuated sales order stock
    thanks
    prasad

    Hi Prasad,
    Check table EBEW for valuated sales order stock.
    If you want to check a sales order to determine this you need to check the Requirement Type on the procurement tab of the sales order item in VA03.
    Check the Requirement Type in OVZH -> this gives you the requirement class.
    Check the requirement class in OVZG -> this will give you information specific to the sales order costing.
    Check your special stock indicator and Valuation fields in the requirements class. As ever the F1 help on each field can be useful.
    Regards, Elaine

Maybe you are looking for