Appropriate article types
-
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project. Would this project type be allowed ?? The finished project would be very similar to the payload of a keylogger virus. The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons. Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
-
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project. Would this project type be allowed ?? The finished project would be very similar to the payload of a keylogger virus. The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons. Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
We (the CP readers, I can't speak for the staff) tend not to like articles like this. While I admire your zeal, the big problem is that while you aren't going to write a virus, there's no guarantee that all the readers of your article will hold themselves to your high standard.
-
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project. Would this project type be allowed ?? The finished project would be very similar to the payload of a keylogger virus. The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons. Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
-
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project. Would this project type be allowed ?? The finished project would be very similar to the payload of a keylogger virus. The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons. Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
A key logger as what it means is not likely to be approved by the coomunity - I speak as Member of this community, there may be other opinions. Whatever, a slightly changed project may be as interesting as a keylogger: Something using an Arduino Board may be worth a try[^], but also an article on Barode scanners might be very interesting.
-
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project. Would this project type be allowed ?? The finished project would be very similar to the payload of a keylogger virus. The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons. Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
I too agree with Pete. Some evils out there always to misuse that. Once started those evils could get all mail logins, bank logins, etc., important details. So please don't. A suggestion for your next article. Make a tool for disabling all keyloggers. Please ....
thatraja
Code converters | Education Needed No thanks, I am all stocked up. - Luc Pattyn When you're wrestling a gorilla, you don't stop when you're tired, you stop when the gorilla is - Henry Minute
-
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project. Would this project type be allowed ?? The finished project would be very similar to the payload of a keylogger virus. The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons. Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
I agree with Pete, Richard and Marco. Exaggerating it a bit... it would be as explaining how to build a gun, you might make it with academical purpose, but in the wrong hands that information can end at someone killing another person. On the other hand... for such themas as possible projects ending in articles, opinions about ideas or asking for help, CP has the Article Writing forum[^], I think you can get more opinions and make a debate about over there.
M.D.V. ;) If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about? Help me to understand what I'm saying, and I'll explain it better to you Rating helpful answers is nice, but saying thanks can be even nicer.
-
I am thinking of writing a keylogger example project for educational purposes only, and then publishing it here on Code Project. Would this project type be allowed ?? The finished project would be very similar to the payload of a keylogger virus. The project itself is a very exciting, and requires at least three separate technologies (Networking, Com Interop, Firewall Management, etc.), so could be useful to other people for legitimate reasons. Currently the project does not exist, and I have never, and will never write a virus, just to be clear on that.
Firstly, the world has enough articles about key loggers. It's seriously been done to death. Secondly, what do you think people are going to do with code for a keylogger? Create a cool app to monitor keyboard usage and suggest ways to improve your typing? Or write apps to scrape passwords? Posting more keylogger code will not make the world a better place. Your skills and enthusiasm deserve better.
-
Firstly, the world has enough articles about key loggers. It's seriously been done to death. Secondly, what do you think people are going to do with code for a keylogger? Create a cool app to monitor keyboard usage and suggest ways to improve your typing? Or write apps to scrape passwords? Posting more keylogger code will not make the world a better place. Your skills and enthusiasm deserve better.
Thanks for the comments. I guess I have decided not to publish this article, because ultimately it will not fly on CP. However, I do not imagine my work would find it's way into any useful virus as there are more complex aspects to such solutions, including delivering the payload of the virus. In answer to the question about 'why do a key logger', the project was conceived to be more than that, and if you read my original question properly, you would realized that. The project was to monitor key strokes, and then send them to a remote database using web services of some sort, also I would have attempted to configure the Windows firewall as well. I think this would have been a very worthy project from an academic perspective, and could have helped people in the community in the future when attempting some of the tasks described above. The key logger was give an obvious source of easily harvested data. So, I will take the advice about changing the project slightly and find another data source, eg. CPU temperature, etc. Cheers, Baxter P.
-
Thanks for the comments. I guess I have decided not to publish this article, because ultimately it will not fly on CP. However, I do not imagine my work would find it's way into any useful virus as there are more complex aspects to such solutions, including delivering the payload of the virus. In answer to the question about 'why do a key logger', the project was conceived to be more than that, and if you read my original question properly, you would realized that. The project was to monitor key strokes, and then send them to a remote database using web services of some sort, also I would have attempted to configure the Windows firewall as well. I think this would have been a very worthy project from an academic perspective, and could have helped people in the community in the future when attempting some of the tasks described above. The key logger was give an obvious source of easily harvested data. So, I will take the advice about changing the project slightly and find another data source, eg. CPU temperature, etc. Cheers, Baxter P.
Baxter P wrote:
if you read my original question properly,
Unfortunately your original question was a little light on the detail. I'm not saying your project wouldn't be useful and very, very interesting. I'm saying that if it's about a keylogger, then not a fantastic idea. As a bit of trivia, many CodeProject downloads treating with things like system hooks are now flagged as spam by antivirus products because they have been used in viruses. This makes me sad.
-
Baxter P wrote:
if you read my original question properly,
Unfortunately your original question was a little light on the detail. I'm not saying your project wouldn't be useful and very, very interesting. I'm saying that if it's about a keylogger, then not a fantastic idea. As a bit of trivia, many CodeProject downloads treating with things like system hooks are now flagged as spam by antivirus products because they have been used in viruses. This makes me sad.
-
Thanks for the comments. I guess I have decided not to publish this article, because ultimately it will not fly on CP. However, I do not imagine my work would find it's way into any useful virus as there are more complex aspects to such solutions, including delivering the payload of the virus. In answer to the question about 'why do a key logger', the project was conceived to be more than that, and if you read my original question properly, you would realized that. The project was to monitor key strokes, and then send them to a remote database using web services of some sort, also I would have attempted to configure the Windows firewall as well. I think this would have been a very worthy project from an academic perspective, and could have helped people in the community in the future when attempting some of the tasks described above. The key logger was give an obvious source of easily harvested data. So, I will take the advice about changing the project slightly and find another data source, eg. CPU temperature, etc. Cheers, Baxter P.
While the individual parts of your proposed application all have legitimate uses, and each could make a good article on its own, bundling them all together creates something that would overwhelmingly be used for malicious purposes. That's not good.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason? Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful? --Zachris Topelius Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies. -- Sarah Hoyt