Caution & Care Are Always A Good Thing...
Quote:
Originally Posted by 'Vyndree',index.php?page=Thread&postID=64757#post6 4757
The OP is right at least in one part -- everyone ought to be careful and smart about what they install so that they can protect themselves from hackers/keyloggers. Tying the reason for the hack to keyclone seems to be a bit of a stretch, but reasonable if you've got yourself an illegal cracked version.
Here's my community service message: Don't download cracked software
Vyndree is right, although I do concede one point to the OP. Just as with downloading cracked software, anytime you use an application that requires external authentication to run, you're potentially exposing yourself to having such data captured. Even with encryption schemes, if a determined troublemaker parses out the encrypted password from the stream, those same encrypted credientials can be spoofed in communication to that site or service by another party.
This information is protected by private businesses & large corporations because it would destroy their business to violate the trust of their users. People catch on and will stop using a site or service. The same applies to small entrepreneurs like KeyClone. If their software is going to be a keylogger they better be grabbing and exploiting everyone's encrypted credentials simultaneously, because word would get out very quickly and the long-term opportunity cost is forgoing any future sales or role in the community. In my mind that makes an intentional keylogging functionality built into the product an unlikely prospect.
Expanding on the idea of propagating secured credentials in an uncontrolled matter... Since pretty much everything we do online (such as this message board, paypal, worldofwarcraft, your email) requires you to provide this information you should not only change your passwords periodically, but also make your passwords distinct and unique from one another! Changing your passwords once a month is useless if all your accounts, services, and memberships all use the same password rotation. Also consider Vyndree's advice as golden: Cracking, is, by its nature, a manipulation of an executable process. If one can manipulate it to free it from requiring security/they can easily manipulate it to do other things as well.