Jump to content

Keylogger tests


wojtek
 Share

Recommended Posts

I just checked both tests against keyloggers (Zeman and SpyShelter) on my PC and Online Armor not detected and  blocked any of them.

There was no reaction or message. So I'm a little concerned :(.

A computer with Windows 8.1 x64. Has anyone tried these tests on windows 8.1 x64?

Link to comment
Share on other sites

I just checked both tests against keyloggers (Zeman and SpyShelter) on my PC and Online Armor not detected and  blocked any of them.

There was no reaction or message. So I'm a little concerned :(.

A computer with Windows 8.1 x64. Has anyone tried these tests on windows 8.1 x64?

Hi

I will let other who has more knowledge and insight in this determined if this can be used to anything, is is just meant as a respons to post 6 , who ask if someone see the same behavior with windows 8.1 pro 64 bit..and with online armor (on trial btw.) version 7.0.0.1866 in standard mode. I have created a small video, (just happen to have some bandwidth left), to illustrate what i have done. Hope it can be used to something constructive :)

 Press Video Link: Online Amor

 

 

 

Link to comment
Share on other sites

Legend, interesting tests.  Have you performed them also for the advanced mode switched on?

Hey Wojtek, nope I haven't. But it shouldn't do a difference, I would think. But then again, I am just a rookie out in the many possible configurations there is in online armor. (great firewall).

Link to comment
Share on other sites

OA performs well against key-loggers etc on x32 versions of Windows but not so well on x64 I'm afraid.

 

Key-logger and Screen-capture is very difficult to block on x64 because of Kernal Patch Protection (Patchguard) restrictions but some others seem to have managed it. Maybe through easy to unpick user mode hooks designed to defeat leak tests rather than offering  proper protection against malware.   

 

Almost all of these type of threats are executables anyway. OA on x64 will alert you to the other suspicious activities/unknown nature of the file long before the key-logging/screen-capture takes place.

 

I like Emsisoft's approach to this where they want real protection rather developing placebo products designed to pass leak-tests. 

 

Cheers 

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...