Spector Pro Uninstall Program

0125
Spector Pro Uninstall Program 4,6/5 833 votes

Donna wrote: I found a receipt in my husband's credit card bill for something I think might be something called Spectre Pro Spyware wireless keylogger. I presume the software must 'phone home' somehow the keylogging activity. Is there any way, perhaps by looking at network activity, that I can tell if my husband bought it for use on my winxp computer? Dear, Dear, Dear - you don't trust him - he doesn't trust you.suggest the answer lies not in the Software - but in a heart to heart talk?.or even a Marriage Guidance Counsellor. Best wishes for the future. On May 18, 10:57.am, Donna wrote: I found a receipt in my husband's credit card bill for something I think might be something called Spectre Pro Spyware wireless keylogger. I presume the software must 'phone home' somehow the keylogging activity.

Spector

Is there any way, perhaps by looking at network activity, that I can tell if my husband bought it for use on my winxp computer? It is all suspicions but anyway; To elminate keyloggers, download and install 'Spybot search and destroy' to scan your system. To sniff network activities, download and install 'Ethereal' For other issues above, Ask Dr. All the best. On May 18, 2:42.pm, 'Sebastian G.' Wrote: aljuhani wrote: To elminate keyloggers, download and install 'Spybot search and destroy' to scan your system.

A lot of people still believe in scanning. Even furtherconsidering what Spybot S&D claims about a provably clean and secured system, it would be even more useless on a surely infected system.

But what qualification of security expertise should we expect from someone who's abusing MSIE as a webbrowser. We can only suggest available tools.

On Sun, 18 May 2008 05:07:31 -0700 (PDT), aljuhani wrote: We can only suggest available tools. Hi everyone, I agree that scanning probably won't work because the software runs on a windows system.

Looking at the disk from another system might work but that would take daily removal of the hard drive and I'd have to know what to look for anyway. I was asking here because I am assuming that the network activity back to the mother ship would be the weak point in detecting this software. I'm still convinced there will likely be signature network activity pinpointing the use of this software - which - by the way - all of you should also check for. But, what do we check specifically for? Googling for 'Spector network activity' I found this article which said there is a certain connection to the domain U2A1376GF-43TY-245B.COM with this software. May I ask how you would recommend a novice look for connections (perhaps in the past) to this domain and how to block them moving forward?

Aljuhani wrote: On May 18, 2:42 pm, 'Sebastian G.' Wrote: aljuhani wrote: To elminate keyloggers, download and install 'Spybot search and destroy' to scan your system.

A lot of people still believe in scanning. Even furtherconsidering what Spybot S&D claims about a provably clean and secured system, it would be even more useless on a surely infected system. But what qualification of security expertise should we expect from someone who's abusing MSIE as a webbrowser. We can only suggest available tools.

No, we can also suggest methods and procedures. That is, ensuring that there's no keylogger in first place. 'Donna' wrote in: I found a receipt in my husband's credit card bill for something I think might be something called Spectre Pro Spyware wireless keylogger. I presume the software must 'phone home' somehow the keylogging activity.

Is there any way, perhaps by looking at network activity, that I can tell if my husband bought it for use on my winxp computer? If this is a shared computer, save all your data files to removable media. Then reformat the drive. When the husband asks, say you don't know why the drive got erased except for some strange error message that popped up saying 'Critical system error: Spectre Pro buffer overrun generated raw disk error.' Maybe he'll think twice before he tries to install it again.

In the meantime, get your own computer and lock it up. On Sun, 18 May 2008 00:57:41 -0700, Donna wrote: I found a receipt in my husband's credit card bill for something I think might be something called Spectre Pro Spyware wireless keylogger. I presume the software must 'phone home' somehow the keylogging activity. Is there any way, perhaps by looking at network activity, that I can tell if my husband bought it for use on my winxp computer?

I would visit there website and call the support department to find out what the key sequence is to bring up the application. If it works then you know it is there. Also you could install and run Windows Defender (from Microsoft website) Ad-Aware SpyBot Search and Destroy. One of the three should find it if it is there.

You could also get your own copy and put on your husbands computer so you can monitor his e-mail to see if he is monitoring yours. On Sun, 18 May 2008 09:52:54 -0400, Steve B.

Spector Pro Free

Wrote: and call the support department to find out what the key sequence is to bring up the application. If it works then you know it is there. When I pressed CTRL-ALT-SHIFT-S, nothing happened (that is the default method of bringing up the program) but according to what I read, the Spector program can be configured to bring it up using any other key combination.

Spector Pro Uninstall Program

I also checked the registry key HKEYLOCALMACHINE Software Microsoft Windows CurrentVersion ShellServiceObjectDelayLoad and C: windows system32 as described at It doesn't seem to be here. I'll go to the Spector web site to see what I can find out about disabling the program anyway, just to be sure. On Sun, 18 May 2008 09:52:54 -0400, Steve B. Wrote: You could also get your own copy In the spirit of the best defence is a good offense, I went to the Spector web site to find out something very interesting. They disable the keylogging software remotely if they find you using it on another machine.

How do they know if you've used it on another machine. Taking advantage of that 'feature', all we'd have to do is make our machines 'look' like another machine and the software would disable itself.

Pretty simple. Now, the question is, how does Spector 'know' what machine it's running on? And, how would we spoof that item? Does anyone know what to do to 'spoof' another computer? Note: Here is their license information saysing what I summarize above: The Spector Pro software license agreement allows a user to install on an additional computer, if the new installation is being done to a computer that is replacing the original computer which Spector Pro was installed.

The original computer must be taken out of service. This policy allows customers who are upgrading to newer computers the ability to continue to use their Spector Pro license with their new computer.

This transfer of the license from an old computer to a new computer can only be done once. Any installations of a Spector Pro serial number on more than two computers or on 2 or more computers simultaneously, will result in the Spector Pro serial number being disabled and the software being deactivated. 'Donna' wrote in: In the spirit of the best defence is a good offense, I went to the Spector web site to find out something very interesting. They disable the keylogging software remotely if they find you using it on another machine. How do they know if you've used it on another machine. Taking advantage of that 'feature', all we'd have to do is make our machines 'look' like another machine and the software would disable itself.

Pretty simple. Now, the question is, how does Spector 'know' what machine it's running on? And, how would we spoof that item? Does anyone know what to do to 'spoof' another computer? Oh, so the 'problem' wasn't what you claimed it to be in your first post. Jim Watt wrote: Going for a new trolling record, 'Donna'? It seems to be a reasonable topic for discussion and is hardy promoting the product.

What might be nice would be to see some helpful comments instead of the usual sniping. I've seen this individual trolling in several other NG's including alt.comp.freeware, news.software.readers, and alt.home.repair.

Same Modus operandi is taking shape here already. Don't let me stop y'all from replying - this one has the potential for 300+ deep. I kill all Google Group posts, you can too. Take back Usenet. On May 19, 1:23.pm, 'David H.

Lipman' wrote: I've seen this individual trolling in several other NG's including alt.comp.freeware, news.software.readers, and alt.home.repair. Morgan is an idiot. He can't stand it when people have manners and use the groups properly. I googled for these posts and found them all to be reasonable and informative with pictures and URLs and phone numbers all. They are limited to certain newsgroups. They are all on topic.

They all are cheerful and attentive. What Morgan doesn't like is the system working. He really can't stand when it works well. Look up HIS posts for example. He's got nothing to offer except to malign good people's reputations. Morgan is an idiot. Morgan is an idiot.

He can't stand it when people have manners and use the groups properly. I googled for these posts and found them all to be reasonable and informative with pictures and URLs and phone numbers all. They are limited to certain newsgroups. They are all on topic. They all are cheerful and attentive.

What Morgan doesn't like is the system working. He really can't stand when it works well. Look up HIS posts for example. He's got nothing to offer except to malign good people's reputations. Idiot. G.

Morgan is an idiot. The information I have seen 'G. Morgan' post is contrary to what you state.

You both have rights to your respective opinions. The difference is Google Groupers don't have the credence of those who use News Clients. BTW: Keylogger questions are indeed OT for alt.internet.wireless which negates your statement.

Dave Multi-AV.

This entry was posted on 25.01.2020.