12-05-2006, 07:26 AM
took apart both d2loader and Advanced Anti-Keylogger.
d2loader only has images commands on it to make the system to think the cd is actually in it. but if you still feel unsure about it, get daemon tools, an image and just run it from the image. I dont tend to use the loader much myself since i have images on different external harddrives and just run the image. what might be setting off your program may be a bot you got from another site or some kind of maphack. in the past there was a maphack made by netter that had a keylogger on it if i remember correctly.
as for Advanced Anti-Keylogger, its owned by spydex which is affiliated with virusburst. So theres a chance that it is also a rogue anti-program. 20% of its algorithims is also tainted which tried to save data on its server (i.e. type of system owner runs, pws, cc numbers etc.) which can be sent and accepted by their company. my firewalls found it. anti-keylogger also sent pings out to its target with information attatched to it that is basically spam information that your system does not need. sometimes it will do host identoverflow so be careful when using it.
d2loader only has images commands on it to make the system to think the cd is actually in it. but if you still feel unsure about it, get daemon tools, an image and just run it from the image. I dont tend to use the loader much myself since i have images on different external harddrives and just run the image. what might be setting off your program may be a bot you got from another site or some kind of maphack. in the past there was a maphack made by netter that had a keylogger on it if i remember correctly.
as for Advanced Anti-Keylogger, its owned by spydex which is affiliated with virusburst. So theres a chance that it is also a rogue anti-program. 20% of its algorithims is also tainted which tried to save data on its server (i.e. type of system owner runs, pws, cc numbers etc.) which can be sent and accepted by their company. my firewalls found it. anti-keylogger also sent pings out to its target with information attatched to it that is basically spam information that your system does not need. sometimes it will do host identoverflow so be careful when using it.