I am asking for a reason different than what you might think. I actually WANT to download a keystroke logger to track activity on my PC. I haven’t yet done so as I am still getting used to Comodo as my firewall (just installed last Friday).
So i guess a better question is “will I be able to run a keystroke logger with Comodo as my firewall”?
You should be aware of the fact that if you are going to use a keylogger in a commercial environment, then there may be privacy and legal implications, depending upon your local laws.
If you’re tracking your kids or significant other, you should be OK, but it wouldn’t hurt to check.
Regardless, NEVER (edit) knowingly (edit) allow a keylogger access to the internet.
NEVER.
EVER.
UNDER ANY CIRCUMSTANCES.
Either that, or you could just send me your bank details now for safekeeping.
Panic, if the keylogger uses a rootkit to hide it’s existance then it is very capable of hiding traffic from firewalls in general (Kernal level/TCP/IP stack).
Anything is possble if you install un-trusted programs under the adminstrator account, expecially if the program has a “.Sys” file.
I have seen on some security cleanup forums of people putting a “Legitamate” keylogger on a computer, forgetting it was their they or another person did some banking and they had their details sent to another email address that they did not know.
Just a note, disabling the hyperthreading worked for many. I think dual core and many issues will be worked out, if not already with the 1.8 beta and beyond. Let’s hope.
I dunno about boclean, but Ice Sword is the one that the rootkit makers are trying to defeat at the moment. When you go hunting for it, make sure you get the EN version, and it can be a bit hard to locate. Chinese one is a little bit harder to understand.