Possible Key Logger

Hey guys. I have reason to believe there is a key logger on my computer. I play the game, World of Warcraft. Recently my account was broken into. They messed a lot of things up. They also had access to my e-mail.
I changed all my passwords from computers at my college as soon as I found out. I have yet to type a password on my computer now. I just copy and paste them when I need to check my e-mail, or play the game.
I am normally pretty safe with my computer I thought. I always have my firewall turned on. At the time, I did not have an anti virus installed however. Many times people suggest people couple key loggers with addons downloaded for the game. I think its very possible thats where it came from. I deleted all the addons for the game I had. I ran Symantec/Norton anti-virus. It didn't come up with anything, but there were quite a few files it "didnt have permission to check." Most of these seemed like normal mac files, but I am a little frightened by it. I got the noscript addon for firefox to hopefully maybe prevent it i nthe future
I guess my question is- how can I be sure there is a key logger. What is a good way to get rid of it. Does doing an archive and install work, or should I just reformat.
Any help is greatly appreciated. Thanks

Do you typically run your computer as an administrator? That's really not good when "sharing" your computer with the world. Apple recommends not casually using the computer administrator account unless actually administrating. Playing games is not an administrative task, AFAIK.
Scan your computer from MacScan website.
Install LittleSnitch. This will alert you of a keylogger, but if there is one, it's too late. If you have a keylogger installed, presume the worst. All personal data are compromised.
Never play games online that let others use or access your computer unless you are prepared for an intrusion.
Your best bet is to use your TM backup and restore your system to a time prior to this event.
And if you have been the victim of an attack, protect your identity with one of hte available services.

Similar Messages

  • Request for key-logger check -- followed instructions from old threads

    Hi everyone,
    This is my first post on this site.  I've become worried about malware installed on my computer (credit card info was stolen last week).  After reading several related posts I am hopeful that I don't actually have a key-logger installed on my computer (since I don't think anyone around me installed malicious software, and it seems unlikely a website could install it without my consent), but I would like to be sure.
    I have followed instructions posted by Linc, and generated this output in terminal:
    --------Terminal output--------
    Test 1 output:
    Test 2 output:
    com.microsoft.office.licensing.helper
    com.google.keystone.daemon
    com.adobe.fpsaud
    Test 3 output:
    com.google.keystone.system.agent
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae
    com.adobe.AAM.Scheduler-1.0
    Test 4 output:
    /Library/Components:
    /Library/Extensions:
    /Library/Frameworks:
    AEProfiling.framework
    AERegistration.framework
    Adobe AIR.framework
    AudioMixEngine.framework
    NyxAudioAnalysis.framework
    PluginManager.framework
    Python.framework
    iTunesLibrary.framework
    /Library/Input Methods:
    /Library/Internet Plug-Ins:
    AdobePDFViewer.plugin
    AdobePDFViewerNPAPI.plugin
    AmazonMP3DownloaderPlugin101736.plugin
    CitrixICAClientPlugIn.plugin
    Flash Player.plugin
    JavaAppletPlugin.plugin
    Mathematica.plugin
    Quartz Composer.webplugin
    QuickTime Plugin.plugin
    SharePointBrowserPlugin.plugin
    SharePointWebKitPlugin.webplugin
    Silverlight.plugin
    flashplayer.xpt
    googletalkbrowserplugin.plugin
    npgtpo3dautoplugin.plugin
    nsIQTScriptablePlugin.xpt
    o1dbrowserplugin.plugin
    /Library/Keyboard Layouts:
    /Library/LaunchAgents:
    com.adobe.AAM.Updater-1.0.plist
    com.google.keystone.agent.plist
    /Library/LaunchDaemons:
    com.adobe.fpsaud.plist
    com.apple.remotepairtool.plist
    com.google.keystone.daemon.plist
    com.microsoft.office.licensing.helper.plist
    /Library/PreferencePanes:
    Flash Player.prefPane
    TeXDistPrefPane.prefPane
    /Library/PrivilegedHelperTools:
    com.microsoft.office.licensing.helper
    /Library/QuickLook:
    iWork.qlgenerator
    /Library/QuickTime:
    AppleIntermediateCodec.component
    AppleMPEG2Codec.component
    /Library/ScriptingAdditions:
    /Library/Spotlight:
    Microsoft Office.mdimporter
    Wolfram Notebook.mdimporter
    iWork.mdimporter
    /Library/StartupItems:
    /etc/mach_init.d:
    /etc/mach_init_per_login_session.d:
    /etc/mach_init_per_user.d:
    Library/Address Book Plug-Ins:
    SkypeABDialer.bundle
    SkypeABSMS.bundle
    Library/Fonts:
    Library/Input Methods:
    .localized
    Library/Internet Plug-Ins:
    .DS_Store
    Google Earth Web Plug-in.plugin
    WebEx64.plugin
    Library/Keyboard Layouts:
    Library/LaunchAgents:
    com.adobe.AAM.Updater-1.0.plist
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist
    com.apple.AddressBook.ScheduledSync.PHXCardDAVSource.3D2FB447-CF7A-4D6C-B796-C91 08A0F0174.plist
    Library/PreferencePanes:
    Test 5 output:
    iTunesHelper, Dropbox, AdobeResourceSynchronizer, Popup
    --------end Terminal output--------
    I've found several other threads with different suggestions for rooting out and eliminating key-loggers. Is this step (above) sufficient, or is there more I should do?  I just read stuff on the flashback virus (on this forum) and followed some Terminal prompts.  I don't think I have it, but I do think I'm getting paranoid now.
    Thanks

    There are many, many possible ways for your credit card number to get stolen. Malware on your Mac, while possible, is the most unlikely. So unlikely that I would not consider it without a good reason.
    As to the question of how to detect a keylogger... that's very difficult. You can detect known malware fairly easily, with a good anti-virus program. However, no current Mac malware incorporates a keylogger. Most includes a backdoor of some kind, which could be used by a hacker to install a keylogger remotely, if you were infected. Alternately, someone malicious with physical access to your computer could also install a keylogger.
    Here's the issue... when you have someone consciously installing a keylogger on your machine, you can't really ever be sure you've detected it. It could be disguised as something legit. It could even replace a system component. Someone with a lot of experience might be able to locate the keylogger, using various methods. You could try to install something like Little Snitch, to intercept any transmissions that software might make... but if someone's already got a backdoor (or physical access) allowing them to install a keylogger, what's to stop them from disabling Little Snitch?
    Bottom line, there's really no reason to believe you have a keylogger on your Mac. However, if you should, at some point in the future, become convinced that you have a keylogger, the only true solution will be to erase the hard drive and reinstall everything from scratch.

  • Illegal use of Key Logger

    Help! I believe an ex boyfriend of mine has placed key logger on my computer. I already read about reinstall, which I may do if I can find the original discs for my computer, however, I'd like to prove key logger is even on the computer first. He has been stalking me. Can someone answer these questions?:
    1. What key logger programs are out there for mac? Someone in a post earlier said there were only two. Is this true? I called Spector and they said the only thing I can do is hope it is their software, order their discs and do an uninstall. I hate to pay money for their discs when I don't even know if that is the software he used. Is there any way my of knowing?
    2. This guy did have the opportunity to load something on the machine and he is computer savy. Especially with Macs. He was monitoring another computer (I caught him).
    3. If I am no longer at the place where he is, is it still possible for him to continue monitoring this machine some 4 years later remotely if he did install a key logger, or do I have to be in the same house, same network, etc. It's been several years since I've seen him and I've moved since and have changed ISPs. Things have transpired that lead me to believe he may still be monitoring this computer.
    4. Is there anyway to detect that a key logger is on the machine so I can prove it to the police before I delete everything and reinstall?
    Any help is appreciated. I've spoken to a couple of apple techs who were unable to help me. I have OS X on this machine.
    Thanks.
    iMac   Mac OS X (10.3.9)  
    iMac   Mac OS X (10.3.9)  

    Hi Betty,
    Thought of something else important you should do. Depending on ex boyfriend's computer abilities, he may also know your MAC (Media Access Control) address and/or IP address. So when you erase the hard drive and reinstall OS X, follow these steps.
    1) When OS X has completed installing, it will reboot and bring you to the welcome login. You answer a few questions about your preferences, if you have an Apple ID, how you connect to the Internet and so on. After it's finished, it will finish booting to the desktop.
    2) At this point, you want to disconnect from the Internet immediately. If you have a cable or DSL modem, either unplug it, or turn it off if it has an on/off switch. This will take you Mac offline as far as any outside intruders are concerned.
    3) Open the System Preferences and click the Sharing icon. Click the Firewall tab and then click the button to turn the firewall on. Click the Advanced button on the same dialogue box. On the resulting sheet, turn on "Enable Stealth Mode". Click OK. Close the System Preferences.
    4) Turn your cable or DSL modem back on. Now update the OS and reinstall your software.
    If your ex has hacking software that he uses to access your computer remotely, having the firewall on will make it much harder for him to access your Mac. Even better, also purchase a VPN firewall enabled cable or DSL router. They're pretty cheap. Around $35 for a 5 port model. Rather than attaching the modem directly to your Mac, you plug it in to the WAN port of the router. Then you use a plain Ethernet cable from your Mac to one of the LAN ports on the router. Your Mac will see the Internet the same as before. What's different is that with a VPN firewall on the router, it's just about impossible for anyone on the outside to see your Mac, or any other computer connected to the router. All a hacker sees when they try to attack your computer is a fictitious "computer" generated by the VPN hardware.
    I've got all of the computers in my house connected to such a router. We can all use the Internet at the same time with only one actual DSL modem. As proof to how strong a VPN firewall is, when we were just using dial-up to connect, it was imperative to have some sort of firewall software on the kid's Windows box. It would stop at least 3 attacks a week. With the VPN router in place, they don't even need the software on. No one can see their computer through it.

  • Key Logger App For Accountability Purposes?

    Hello, I was wondering if there is a key logger app available for a non-jailbroken iPhone for accountability purposes?  The current accountability apps are not good (Covenant Eyes, X3 Watch etc....) because they only monitor the browser they have you install (Covenant Eyes Browser).  The rest of the iPhone is not monitored.  I am a young adult and would like the option to be fully accountable on the iPhone without having to block iPhone features such as Safari.  Thanks.

    Meg St._Clair wrote:
    desertsquirrel wrote:
    "Access to the core functions of the phone necessary to do so would itself require compromising the security of the phone.", when in reality it would not compromise the security of the phone.  The core functions would be accessed, but the phone would remain secure. 
    That makes absolutely no sense. Access to the core functions of the phone would most definitely compromise security. I'm not sure what universe you live in where that would not be the case. Your faith in these theoretical companies that could be trusted with this access is touching, though. 
    Android phones, which do allow such access, have revealed a number of serious vulnerabilities recently. Start your reading here:
    http://www.symantec.com/connect/blogs/android-vulnerability-allows-app-hijacking
    It would compromise security if used for that purpose yes.  Just like if someone takes your phone with malicious purposes, say steal your credit card information, instead of a family member or friend borrowing it to show you a funny video. Your sarcasm is unseeded and misplaced.  These, "theoretical companies", are actually real companies.  With these companies, "there has not been any abuses of privileges on Mac, PC, or Android devices.  You think the companies would all of a sudden decide to abuse the iPhone when they could have done so already with other operating systems?   
    You missed a very important part in the article that you posted. "We have added detection logic for the vulnerable condition to our backend Norton Mobile Insight systems and, out of four million applications, have not yet discovered malicious usage of the vulnerability."  Bring it up again if there is ever anything that is actually happening, instead of just the possibility of something being breached. It looks like you would have bought into Symantec's ploy to sell you their product.

  • Key Logger Providing To Overseas Hacker?

    Hi,
    I have reason to believe a key logger may be installed on my MAC OS (v 10.6.8) that is providing my key strokes to someone overseas.
    This someone had physical and administrator password access to my MAC last year.
    1. How do I check if a foreign IP address has "connected" to my PC in the last "while"?
    2. How can I definitively detect key logger software?
    3. Has any key logging software been known to survive a MAC OS (v10.6.8) re-installation + Time Machine recovery?
    Cheers!

    I play an online game called Hardwood hearts/spades etc. basically under the company "Hardwood." There is a certain player that started stalking me on it a few days ago. When i created new accounts they new exactly who I was and Hardwood trys to kick them out but they have hundreds of accounts so they can never find him. Today when i went into my hardwood games the lobby was completely empty (usually has hundreds of people in it) and he was the only one that was coming up. Some of the things he was saying was pretty malicious and he said that he has three laptops he works from, i mean just really weird stuff. When I contacted Hardwood they said that he could have possible hacked into your computer some how and to change all my usernames unless i had a key logger and to remove that before i changed them. I really don't know what the heck is going on but i do know the person lives about 40 minutes away from me. lol.

  • I believe that I have a key logger installed on my mac

    Hello, I am pretty sure there is some sort of keylogger installed on my Mac.  Going through a divorce right now and I know for a fact that the other party is able to access my computer somehow.  I think it is a key logger because they know way too much information and have told me that they have been able to watch me writing emails.  I found the Linc Davis email with instructions on how to check the shell commands.  Can anyone please look at this and tell me if they see anything out of the ordinary?  Thanks in advance.
    Password:
    com.microsoft.office.licensing.helper
    com.macromates.auth_server
    com.adobe.fpsaud
    Keiths-MacBook-Air:~ keithnemeth$ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}'
    com.microsoft.autoupdate.fba.10064
    Keiths-MacBook-Air:~ keithnemeth$
    Keiths-MacBook-Air:~ keithnemeth$ ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null
    /Library/Components:
    /Library/Extensions:
    ATTOCelerityFC8.kext
    ATTOExpressSASHBA2.kext
    ATTOExpressSASRAID2.kext
    ArcMSR.kext
    CalDigitHDProDrv.kext
    HighPointIOP.kext
    HighPointRR.kext
    PromiseSTEX.kext
    SoftRAID.kext
    /Library/Frameworks:
    AEProfiling.framework
    AERegistration.framework
    AudioMixEngine.framework
    EWSMac.framework
    NyxAudioAnalysis.framework
    PluginManager.framework
    iTunesLibrary.framework
    /Library/Input Methods:
    /Library/Internet Plug-Ins:
    Default Browser.plugin
    Flash Player.plugin
    GarminGpsControl.plugin
    Quartz Composer.webplugin
    QuickTime Plugin.plugin
    SharePointBrowserPlugin.plugin
    SharePointWebKitPlugin.webplugin
    flashplayer.xpt
    nsIQTScriptablePlugin.xpt
    /Library/Keyboard Layouts:
    /Library/LaunchAgents:
    /Library/LaunchDaemons:
    com.adobe.fpsaud.plist
    com.macromates.auth_server.plist
    com.microsoft.office.licensing.helper.plist
    /Library/PreferencePanes:
    Flash Player.prefPane
    /Library/PrivilegedHelperTools:
    com.macromates.auth_server
    com.microsoft.office.licensing.helper
    /Library/QuickLook:
    iBooksAuthor.qlgenerator
    iWork.qlgenerator
    /Library/QuickTime:
    AppleIntermediateCodec.component
    AppleMPEG2Codec.component
    /Library/ScriptingAdditions:
    /Library/Spotlight:
    Microsoft Office.mdimporter
    iBooksAuthor.mdimporter
    iWork.mdimporter
    /Library/StartupItems:
    /etc/mach_init.d:
    /etc/mach_init_per_login_session.d:
    /etc/mach_init_per_user.d:
    Library/Address Book Plug-Ins:
    Library/Fonts:
    Library/Frameworks:
    EWSMac.framework
    Library/Input Methods:
    .localized
    Library/Internet Plug-Ins:
    Library/Keyboard Layouts:
    Library/LaunchAgents:
    Library/PreferencePanes:
    Library/Services:
    .localized
    Keiths-MacBook-Air:~ keithnemeth$ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null
    iTunesHelper, Genieo
    Keiths-MacBook-Air:~ keithnemeth$

    Knemeth16 wrote:
    Ok, but that doesn't help my situation with the key logger.
    I don't think we fully understand your objective with regard to it. Are you trying to verify it's presence or just get rid of it?
    If the former you should know that only one anti-malware vendor targets such things and it isn't very good at what it tries to do. Since almost all keyloggers and other spyware serves legitimate purposes and is commercial or hack software, it normally won't be detected. Installation requires physical access to your computer or local network, so other types of malware are not the issue here.
    Do you recognize the source of all the files listed above? There are several names that I don't recognize.
    If you simply want it gone, then shldr2thewheel has the best ideal. Even though re-installing the OS should preserve all your user files, make sure you have a complete, viable backup before you do the restore. There will probably be fragments of any keylogger that was installed, but in all probability it will have been disabled.

  • Hard disk in mums macbook failed, bought a new one, formatted it first. Have tried starting it with every possible key and I either get flashing question mark folder or a cursor.

    Hard disk in mums macbook failed, bought a new one, used sata adapter cable to format it for mac first. Connected it and have tried starting it with every possible key combination and I either get flashing question mark folder or a cursor. A disk is stuck in it so I can't boot from OSX, and yes I have tried every option of starting to try and eject disk but none work. HELP ME!

    Five ways to eject a stuck CD or DVD from the optical drive
    Ejecting the stuck disc can usually be done in one of the following ways:
      1. Restart the computer and after the chime press and hold down the
          left mouse button until the disc ejects.
      2. Press the Eject button on your keyboard.
      3. Click on the Eject button in the menubar.
      4. Press COMMAND-E.
      5. If none of the above work try this: Open the Terminal application in
          your Utilities folder. At the prompt enter or paste the following:
            /usr/bin/drutil eject
    If this fails then try this:
    Boot the computer into Single-user Mode. At the prompt enter the same command as used above. To restart the computer enter "reboot" at the prompt without quotes.
    If you have a 2010 MBP or later, then you can use Internet Recovery. Start by rebooting the computer. At the chime press and hold down the COMMAND-OPTION-R keys until a Globe appears in the upper part of the screen. This process can take upwards of 15 minutes to get connected to the Apple network servers. You should eventually see the utility screen of the Recovery HD. You may now go about the process to install Mountain Lion:
    Install Lion/Mountain Lion on a New HDD/SDD
    Be sure you backup your files to an external drive or second internal drive because the following procedure will remove everything from the hard drive.
    Boot to the Internet Recovery HD:
    Restart the computer and after the chime press and hold down the COMMAND-OPTION- R keys until a globe appears on the screen. Wait patiently - 15-20 minutes - until the Recovery main menu appears.
    Partition and Format the hard drive:
    1. Select Disk Utility from the main menu and click on the Continue button.
    2. After DU loads select your external hard drive (this is the entry with the mfgr.'s ID and size) from the left side list. Click on the Partition tab in the DU main window.
    3. Under the Volume Scheme heading set the number of partitions from the drop down menu to one. Click on the Options button, set the partition scheme to GUID then click on the OK button. Set the format type to Mac OS Extended (Journaled.) Click on the Partition button and wait until the process has completed. Quit DU and return to the main menu.
    Reinstall Lion/Mountain Lion: Select Reinstall Lion/Mountain Lion and click on the Install button. Be sure to select the correct drive to use if you have more than one.
    Note: You will need an active Internet connection. I suggest using Ethernet if possible because it is three times faster than wireless.

  • When entering an address, I am always queried to allow forwarding or not. Does that mean I have a key-logger attached to my searches?

    When entering an address, I am always queried to allow forwarding or not. Does that mean I have a key-logger attached to my searches? The message says Firefox prohibited redirection to another page, even when I open my home page. Please advise.

    I would recommend posting in the iTunes forum: https://discussions.apple.com/community/itunes/itunes_for_mac

  • I believe I have a key logger or spyware on my computer

    I believe I have a key logger or spyware on my computer.  Any help?

    Helpful Links Regarding Malware Problems
    If you are having an immediate problem with ads popping up see The Safe Mac » Adware Removal Guide and AdwareMedic.
    Open Safari, select Preferences from the Safari menu. Click on Extensions icon in the toolbar. Disable all Extensions. If this stops your problem, then re-enable them one by one until the problem returns. Now remove that extension as it is causing the problem.
    The following comes from user stevejobsfan0123. I have made minor changes to adapt to this presentation.
    Fix Some Browser Pop-ups That Take Over Safari.
    Common pop-ups include a message saying the government has seized your computer and you must pay to have it released (often called "Moneypak"), or a phony message saying that your computer has been infected, and you need to call a tech support number (sometimes claiming to be Apple) to get it resolved. First, understand that these pop-ups are not caused by a virus and your computer has not been affected. This "hijack" is limited to your web browser. Also understand that these messages are scams, so do not pay any money, call the listed number, or provide any personal information. This article will outline the solution to dismiss the pop-up.
    Quit Safari
    Usually, these pop-ups will not go away by either clicking "OK" or "Cancel." Furthermore, several menus in the menu bar may become disabled and show in gray, including the option to quit Safari. You will likely have to force quit Safari. To do this, press Command + option + esc, select Safari, and press Force Quit.
    Relaunch Safari
    If you relaunch Safari, the page will reopen. To prevent this from happening, hold down the 'Shift' key while opening Safari. This will prevent windows from the last time Safari was running from reopening.
    This will not work in all cases. The shift key must be held at the right time, and in some cases, even if done correctly, the window reappears. In these circumstances, after force quitting Safari, turn off Wi-Fi or disconnect Ethernet, depending on how you connect to the Internet. Then relaunch Safari normally. It will try to reload the malicious webpage, but without a connection, it won't be able to. Navigate away from that page by entering a different URL, i.e. www.apple.com, and trying to load it. Now you can reconnect to the Internet, and the page you entered will appear rather than the malicious one.
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
      Mac OS X Snow Leopard and malware detection
      OS X Lion- Protect your Mac from malware
      OS X Mountain Lion- Protect your Mac from malware
      OS X Mavericks- Protect your Mac from malware
      About file quarantine in OS X
    If you require anti-virus protection Thomas Reed recommends using ClamXAV. (Thank you to Thomas Reed for this recommendation.)
    From user Joe Bailey comes this equally useful advice:
    The facts are:
    1. There is no anti-malware software that can detect 100% of the malware out there.
    2. There is no anti-malware that can detect everything targeting the Mac.
    3. The very best way to prevent the most attacks is for you as the user to be aware that
         the most successful malware attacks rely on very sophisticated social engineering
         techniques preying on human avarice, ****, and fear.
    4. Internet popups saying the FBI, NSA, Microsoft, your ISP has detected malware on
        your computer is intended to entice you to install their malware thinking it is a
        protection against malware.
    5. Some of the anti-malware products on the market are worse than the malware
        from which they purport to protect you.
    6. Be cautious where you go on the internet.
    7. Only download anything from sites you know are safe.
    8. Avoid links you receive in email, always be suspicious even if you get something
        you think is from a friend, but you were not expecting.
    9. If there is any question in your mind, then assume it is malware.

  • How can I tell if I have key logger on my Mac

    I am not computer savy but I have reason to believe that someone has loaded a key logger program on my computer.  Can someone walk me, very patiently, through the steps to find out?

    Hi, this is very difficult to find out, but some old info to get you started.
    See these for a list of some key loggers...
    http://forums.macosxhints.com/archive/index.php/t-41204.html
    http://www.keylogger-mac.com/mac-keylogger-perfect-keylogger-for-mac-os-x.html
    http://uglypufferfish.com/2008/10/31/mac-keyloggers/

  • Perfect Key Logger on Macbook pro?

    Hi,
    I have reason to believe my boyfriend has downloaded a key logger onto my computer.  I started  noticing weird programs being downloaded that had to do with unarchiving files and unencrypting text and I looked into it and found an icon that said "PKL.app".  So I googled it and perfect key logger came up.  I tried to download it myself and when I did, it would download and never open.  I know they are supposed to open the first time but then otherwise run in the background and only open with hot keys.  I have tried a couple of variations with no luck.  When I click the PKL.app icon (I saved it to my desktop after I found it) and press "open" nothing happens.  If I press "get info" it says the date it was downloaded, last time it was opened ect.  Also, within the "get info" area on the app icon there is a option to click that says "hide extensions" which is clicked and I am unable to unclick it.  He has open access to my computer and I haven't had any credit card theft or anything like that which leads me to believe it is someone that doesn't have a desire to do anything other than on my personal level.  Can someone take a look at what the terminal showed and give me any insight?  If nothing shows up does anyone know what this PKL app that I can't open is?  Also I tried removing the app and it wouldn't let me.  Here are my terminal results:
    Last login: Thu Feb 12 20:41:34 on ttys000
    (name deleted for privacy)-MacBook-Pro-2:~ (name deleted for privacy)$ kextstat -kl | awk '!/com\.apple/{printf "%s %s\n", $6, $7}'
    com.zeobit.kext.Firewall (2.3.4)
    (name deleted for privacy)-MacBook-Pro-2:~ (name deleted for privacy)$ sudo launchctl list | sed 1d | awk '!/0x|com\.(apple|openssh|vix)|edu\.mit|org\.(amavis|apache|cups|isc|ntp|postfi x|x)/{print $3}' 
    com.zeobit.MacKeeper.AntiVirus
    com.microsoft.office.licensing.helper
    com.adobe.fpsaud
    (name deleted for privacy)-MacBook-Pro-2:~ (name deleted for privacy)$ launchctl list | sed 1d | awk '!/0x|com\.apple|edu\.mit|org\.(x|openbsd)/{print $3}' 
    com.zeobit.MacKeeper.Helper
    com.spotify.webhelper
    com.google.keystone.user.agent
    com.BT.PKL
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae
    (name deleted for privacy)-MacBook-Pro-2:~ (name deleted for privacy)$ ls -1A /e*/mach* {,/}L*/{Ad,Compon,Ex,Fram,In,Keyb,La,Mail/Bu,P*P,Priv,Qu,Scripti,Servi,Spo,Sta} * L*/Fonts 2> /dev/null 
    /Library/Components:
    /Library/Extensions:
    hp_io_enabler_compound.kext
    /Library/Frameworks:
    AEProfiling.framework
    AERegistration.framework
    Adobe AIR.framework
    AudioMixEngine.framework
    NyxAudioAnalysis.framework
    PluginManager.framework
    iTunesLibrary.framework
    /Library/Input Methods:
    /Library/Internet Plug-Ins:
    AdobePDFViewer.plugin
    AdobePDFViewerNPAPI.plugin
    Flash Player.plugin
    JavaAppletPlugin.plugin
    Quartz Composer.webplugin
    QuickTime Plugin.plugin
    SharePointBrowserPlugin.plugin
    SharePointWebKitPlugin.webplugin
    Silverlight.plugin
    flashplayer.xpt
    nsIQTScriptablePlugin.xpt
    /Library/Keyboard Layouts:
    /Library/LaunchAgents:
    /Library/LaunchDaemons:
    com.adobe.fpsaud.plist
    com.apple.remotepairtool.plist
    com.microsoft.office.licensing.helper.plist
    com.zeobit.MacKeeper.AntiVirus.plist
    /Library/PreferencePanes:
    Flash Player.prefPane
    /Library/PrivilegedHelperTools:
    com.microsoft.office.licensing.helper
    /Library/QuickLook:
    iWork.qlgenerator
    /Library/QuickTime:
    AppleIntermediateCodec.component
    AppleMPEG2Codec.component
    /Library/ScriptingAdditions:
    /Library/Spotlight:
    Microsoft Office.mdimporter
    iWork.mdimporter
    /Library/StartupItems:
    /etc/mach_init.d:
    /etc/mach_init_per_login_session.d:
    /etc/mach_init_per_user.d:
    Library/Address Book Plug-Ins:
    SkypeABDialer.bundle
    SkypeABSMS.bundle
    Library/Fonts:
    Library/Input Methods:
    .localized
    Library/Internet Plug-Ins:
    Library/Keyboard Layouts:
    Library/LaunchAgents:
    com.BT.PKL.plist
    com.adobe.ARM.202f4087f2bbde52e3ac2df389f53a4f123223c9cc56a8fd83a6f7ae.plist
    com.apple.AddressBook.ScheduledSync.PHXCardDAVSource.45B48A27-9871-4335-99D8-FA1 FA534FCE0.plist
    com.apple.CSConfigDotMacCert-(email deleted for privacy)SharedServices.Agent.plist
    com.google.keystone.agent.plist
    com.spotify.webhelper.plist
    com.zeobit.MacKeeper.Helper.plist
    Library/PreferencePanes:
    (name deleted for privacy)-MacBook-Pro-2:~(name deleted for privacy)$ osascript -e 'tell application "System Events" to get name of every login item' 2> /dev/null 
    iTunesHelper, Dropbox, AdobeResourceSynchronizer, Google Drive
    (name deleted for privacy)-MacBook-Pro-2:~ (name deleted for privacy)$

    Yes, a keylogger is installed. What you should do next depends on the circumstances.
    If you're an adult, and the keylogger was installed on your personal computer without your permission, then the computer may be evidence of a crime or a civil wrong. Consider the legal implications before you do anything. Assume that everything you've done with the computer is known to the party who installed the keylogger.
    If you just want to clean up the machine, see below.
    The only way you can be sure that the computer is not compromised is to erase at least the startup volume and restore it to something like the status quo ante. The easiest approach is to recover the entire system from a backup that predates the attack. Obviously, that's only practical if you know when the attack took place, and it was recent, and you have such a backup. You will lose all changes to data, such as email, that were made after the time of the snapshot. Some of those changes can be restored from a later backup.
    If you don't know when the attack happened, or if it was too long ago for a complete rollback to be feasible, then you should erase and install OS X. If you don't already have at least two complete, independent backups of all data, then you must make them first. One backup is not enough to be safe.
    When you restart after the installation, you'll be prompted to go through the initial setup process for a new computer. That’s when you transfer the data from a backup in Setup Assistant.
    Select only users in the Setup Assistant dialog—not Applications, Other files and folders, or Computer & Network Settings. Don't transfer the Guest account, if it was enabled.
    Reinstall third-party software from original media or fresh downloads—not from a backup, which may be contaminated. Don't reinstall "MacKeeper," which is a scam.
    Unless you were the target of an improbably sophisticated attack, this procedure will leave you with a clean system. If you have reason to think that you were the target of a sophisticated attack, then you need expert help.
    That being done, change all Internet passwords and check all financial accounts for unauthorized transactions. Do this  after the system has been secured, not before.

  • How to generate all possible keys for DES algorithm

    Hello every one,
    I want to generate all the possible key combinations for the DES algorithm 56-bit "actuallly 64 but the last 8 bits are just padding", so can anyone plz help how can i do that? or give me article or something that might help me?
    Thanks in advance,
    Amr M. Kamel.

    I know that but who said that it will be one
    processor it will be on distributed and clustered
    environment :). I just want to know how to generate
    the keys "or write binary".
    Thans again for your helpA cluster of 2285 machines will still take a year! The simplest algorithm is to just count from 0 to 2^56 .
    If you are thinking of cracking DES then there is a Book I have on my shelf 'Cracking DES' published by the 'Electronic Frontier Foundation' ISBN 1-56592-520-3 . It contains the C code and describes the hardware used. The hardware cost was about $100,000 and it cracks DES in about 3.5 days.
    Assuming Moore's law ( http://en.wikipedia.org/wiki/Moore's_law ) applies then it should now take about much less than a day and cost much less than $100,000. BUT - it will take a long time using basic computers.

  • Has anyone else had MS anti key logger mess up isqlplus?

    Has anyone else had MS anti key logger mess up isqlplus?
    If you have, do you have any idea how to undo it?
    Wayne

    I'm having the same issue but with HP Photosmart 7525 and HP LaserJet P1102W.  Both worked fine until earlier this week when I "shut down and updated" my computer.  I keep deleting the printers from my computer and reinstalling them;
    they work temporarily then tell me they are "offline" when, clearly, they are not.

  • I think my Pro has a bespoke key logger/spyware installed

    Hi,
    I think my macbook has either a key logger and/or some form of spyware installed. I doubt it will be an off the shelf application - the person suspected is a developer and has a high level of skills. I am okay using terminal with instructions, and have followed the steps to look for the known programmes. Can anyone suggest how I can look to determine if there is some form of bespoke programme installed?
    Many thanks

    This would be highly unlikely, but given your concern see the following:
    Helpful Links Regarding Malware Protection
    An excellent link to read is Tom Reed's Mac Malware Guide.
    Also, visit The XLab FAQs and read Detecting and avoiding malware and spyware.
    See these Apple articles:
              Mac OS X Snow Leopard and malware detection
              OS X Lion- Protect your Mac from malware
              OS X Mountain Lion- Protect your Mac from malware
              About file quarantine in OS X
    If you require anti-virus protection I recommend using VirusBarrier Express 1.1.6 or Dr.Web Light both from the App Store. They're both free, and since they're from the App Store, they won't destabilize the system. (Thank you to Thomas Reed for these recommendations.)

  • Key Logger Application

    Hai,
    I am new to this forum. And I want to create key logger application to keep track of what ever i enter from keyboard. I dont have any experience before for writing java application. Ofcourse lot of key loggers softwares are available. But I want to create my own application. Please people help me to how to start and I need your guidance too.

    That would not be a suitable topic of discussion for a "Java Desktop Applications" forum.
    db

Maybe you are looking for

  • How to Determine Color types in a file?

    How can we tell if a document has any CMYK, RGB or Pantone colors within any object (curves, text, etc.)?  The requires are just to report that the document has any CMYK and/or RGB and/or Pantone colors.  We already can get the color for a bitmap ima

  • Bash: Passphrase encryption program

    Bash: Passphrase encryption program I wrote this a while back while playing with gpg. #!/bin/bash # Passphrase encryption program # Created by Dave Crouse 01-13-2006 # Reads input from text editor and encrypts to screen. clear echo " Passphrase Encry

  • Powershell and oracle and duplicate data in table

    I have created powershell script to  insert data in oracle table   from csv file and I want to know how to stop insert  duplicate row when Powershell script runs multiple time My powershell script is as follow: '{0,-60}{1,20}' -f "Insert TEEN PREGNAN

  • Best settings to convert RAW into high quality JPEG

    I am a little bit lost when reading discussions regarding the best way to have photos accepted by Istockphoto. They are extremely demanding about the quality of the pictures and they accept zero artifacts for example. I read that any corrections made

  • Slow boot/startup MBP after Mavericks upgrade

    Hi Macbook Pro users out there! Since upgrading my MBP Mid 2009 from Mountain Lion to Mavericks, a simple system restart takes about 3-5 minutes, compared to about 15-30 seconds before the upgrade. Most of the booting time ist consumed after entering