login about faq

To prove you're not a spammer, email newuser.lgqa@gmail.com with the subject "Account Request" to request an account.

somebody shared this post from facebook:

http://a4.sphotos.ak.fbcdn.net/hphotos-ak-snc7/s320x320/315756_210478935688207_100001783055599_466451_549634110_n.jpg with the caption:

Wall Photos Dear friends, If you visit a cyber cafe and find find any black pin attached to your CPU as shown in the picture, kindly do not use that system. This pin is actually a connection which save all your data you enter in the system. Thus it is a risk to your privacy over net. Risk to passwords, banking or any data you entered. Itz a hardware keylogger very powerful it records each and every action ur system. Like and then share this to all your friends..........

and I think it's absurd, is there any truth to this?

asked Nov 04 '11 at 07:46

xedric14's gravatar image


That is a key logger, and there illegal to use without a persons knowledge. all it does is record every keystroke you enter.

they can be all kinds of shapes, thats round type one, there are also ones that look like USB to PS/1 PS/2 adapters.

there impossible to tell apart so if you are using a public computer often, have a look at the back of them to see how there connected, if you notice a new adapter ask if it's supposed to be there.

if you work in an office, mark your keyboard, as some keyboards that are cheap and widely available can be switched with one that has a key logger built into them. make your keyboard individual.


i would put a link to what it is, but i can only find them for sale.

2m Memory PS2 Keylogger

Product Description Product code: KPS2-LOG

Hardware Keylogger KPS2-LOG is a small external device, plugged into keyboard socket or buit-in. The function of the device is to record any key pressed each time thus creating in its internal memory copy of the text entered by the keyboard. The text recorded in keylogger`s memory is entirely readable, since the keylogger puts together all signs recorded in its memory and forms sentences out of them. Another fact worth mentioning is that the device is able to identify functional keys pressed by the user.

KPS2-LOG device has its internal memory which is not dependent by any means on the computer`s work. KPS2-LOG can store specified number of signs in the memory for any time long. The number of signs is dependent on the size of memory used in the device. Example memory size = the number of pressed keys

512kb = 512000 pressed keys = 3 month period of intensive typing ( when working eight hours per day) The device is available with internal memory size: - 512KB- 2 MB

Hardware keylogger is offered in two versions; A) KPS2-LOG built in the keyboard. In this version henlee company always uses keyboards having certificates and proving conformity with CE requirements. Keyboard after building in of the device is not different from ordinary keyboard without the device in any physical way.

B) KPS2-LOG as an independent external device plugged into computer keyboard`s port where the keyboard is going to be plugged.

Reading out of data recorded in KPS2-LOG Reading out of data is very simple, any text editor is sufficient for that: E. G. System wordpad. After entering unique password Menu with available list of options appears. Data might be reconstructed on any computer it does not require this particular computer with which the keyboard was used. Application of the device and its qualities.

  1. Discreetly intercepts pressed keys in: E-mails, chats, comunicators, WWW websites and more.
  2. Built-in memory is capable of storing up to 500, 000 pressed keys, which corresponds to around 200 text pages.
  3. Does not require any software to function.
  4. Impossible to detect by program scanners.
  5. Very easy installation like of ordinary keyboard
  6. You do not have to install or learn any additional software, you save your precious time.
  7. Does not make use of computers hardware reserves i. E. Memory, disc so CPU does not slow down and it does not influence your computers stability either.
  8. Works with all operational systems on PC, since it works independently from software - it starts to work as soon as computer starts so it intercepts even BIOS password.
  9. Impossible to detect by scanners for detection of monitoring software.
  10. Unlike in monitoring programs unauthorized user can not delete kept data.
  11. Data are entirely safe from inercepting or modifying by web-intruder.
  12. Interference, or any modification of recorded information is impossible, and additionally kept data are enciphered ENCIPHERED

answered Nov 04 '11 at 17:50

roguekiller23231's gravatar image


edited Nov 04 '11 at 17:53

thanks man. :)

(Nov 05 '11 at 06:25) xedric14 xedric14's gravatar image

I've made a fix to my password to counter this just now. :)

(Nov 05 '11 at 06:28) xedric14 xedric14's gravatar image

I added one character, something memorable but I won't Type that in the keyboard. instead, i'll be using the mouse to open the On-screen keyboard and type it through there.

scrybe (by synaptics) also allowed me to type in to my computer using a gesture in the Touchpad and "virtually" pressing a key. there. that's my 2nd line defense. 1st line? check for hardware anomalies. (as suggested by the wall post)

(Nov 05 '11 at 06:30) xedric14 xedric14's gravatar image

May be,as i haven't read anything about it. But most obviously it will be a connector for keyboard , nothing more than that.

On facebook there are a lot of users love to have so many likes and share,half of the posted pictures/stories are fake,facebook is for scams basically now.Everyday there is a new scam.

And of course no one is going to see the backside of a computer in cyber cafe .More easier someone can install keyloggers as a software to get the passwords.

And finally cafe is not the place to acces your bank account or any confidential accounts.

answered Nov 04 '11 at 08:18

abhibalani's gravatar image


The strangest thing about this Device is that it is ROUND and I don't know any port good for data transfer that's round.

looks more to me like an extension for a 3.5mm audio jack

answered Nov 04 '11 at 10:37

xedric14's gravatar image



It's connected to the PS2 port, which is the input for older keyboard and mouse devices.

(Nov 04 '11 at 20:52) Tim Fontana Tim%20Fontana's gravatar image

For avoiding the perils of using a computer "away from home" where you could be compromised, take along your CD with LPS-DeLuxe-Public v.1.2.5 which is a Linux self contained OS with everything you need to use a "public computer". The session does not remain on the computer so be sure to take your disk with you when you leave.

answered Nov 05 '11 at 00:32

olamoree's gravatar image


Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here



Answers and Comments

Markdown Basics

  • *italic* or __italic__
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported



Asked: Nov 04 '11 at 07:46

Seen: 2,818 times

Last updated: Nov 05 '11 at 06:30