Quote:
Originally posted by evertonian+May 24 2007, 22:41--></span><table border='0' align='center' width='95%' cellpadding='3' cellspacing='1'><tr><td>QUOTE (evertonian @ May 24 2007, 22:41)</td></tr><tr><td id='QUOTE'> <!--QuoteBegin--Heddskott@May 24 2007, 22:24
Yes, Lake is right. I did look at both proxies from the copyed and his. His looked all nice and the other proxy are connected to some ftp server. Trust him, it doesnt have any keylogger in this one..
|
keyloggers arn't a problem, TQ has encrypted all their login fields so a keylog is useless anyway. A keylog would just show ******* for someones conquer password.
This is a java program. The creator could modify the program to send any login details to himself without the use of a keylogger.
I decompiled the file myself and couldn't find anything to worry about but if i'm honest, i dont really know what i'm looking for [/b][/quote]
I know, did you read everything I were typing?
Almost all password fields sends encrypted. The problem with keylogger is that it records the keystrokes,not the login. Programs like proxys can send loginfo via URL ftp.