How to Remove ComputerCOP
As EFF outlined in a special report, ComputerCOP is a piece of "Internet Safety" software of dubious value that law enforcement agencies around the country have distributed to families for free. One of the main components of the software is KeyAlert, a keystroke-capturing function that records everything a user types.
KeyAlert has two major functions. First, it logs keystrokes on the user's hard drive. Second, it allows the person installing the software to set certain keywords. Whenever those keywords are typed, the computer sends an email with those keystrokes to the person who installed the software.
ComputerCOP doesn't appear in any of the major malware/spyware registries, so you'll need to do a little digging yourself. With this easy guide, we'll show you how to identify whether ComputerCOP has been installed on your computer and how to remove it.
Step One: To determine if KeyAlert is running, open the Task Manager and look for CCNet.exe. Alternatively, if the user installed it in the default location, you can find it installed in “C:\Program Files\WinSS\Book”. You may also be able to spot its icon in the system tray. On a Mac, open Finder and navigate to the root directory of your Mac's hard drive. If there is a file named "LogKextUninstall.command" then the Mac version of ComputerCOP's keylogger is installed.

When KeyAlert is running, all keystrokes are logged to text files located in the folder “C:\Windows\WinCCNet”. These text files are completely unencrypted. (On a Mac, these keystroke logs are actually encrypted, but can be decrypted with the software's default password. Instructions for viewing them are available here.)

When KeyAlert's email warning functionality is activated, these logs are also transmitted over the Internet unencrypted. This allows anyone on the same network to view the content of the ComputerCOP alert email, including any usernames or passwords that may have been typed before one of the keywords.

KeyAlert can be uninstalled even without the installation CD. Go to Add/Remove Programs, select “KeyAlert”, and then click “Remove”, or if the user installed it in the default location, delete the folder “C:\Program Files\WinSS\Book” and then make sure to reboot your computer. On a Mac, open Finder and navigate to the root directory of your Mac's hard drive. Find the file named "LogKextUninstall.command" and double-click on it to uninstall the keylogger.

You will also want to delete all the keystrokes records stored on your hard drive. Go the folder “C:\Windows\WinCCNet" and delete the entire folder. On Mac these are deleted automatically.
Recent DeepLinks Posts
-
Mar 20, 2015
-
Mar 20, 2015
-
Mar 19, 2015
-
Mar 19, 2015
-
Mar 19, 2015
Deeplinks Topics
- Fair Use and Intellectual Property: Defending the Balance
- Free Speech
- Innovation
- International
- Know Your Rights
- Privacy
- Trade Agreements
- Security
- State-Sponsored Malware
- Abortion Reporting
- Analog Hole
- Anonymity
- Anti-Counterfeiting Trade Agreement
- Biometrics
- Bloggers' Rights
- Broadcast Flag
- Broadcasting Treaty
- CALEA
- Cell Tracking
- Coders' Rights Project
- Computer Fraud And Abuse Act Reform
- Content Blocking
- Copyright Trolls
- Council of Europe
- Cyber Security Legislation
- CyberSLAPP
- Defend Your Right to Repair!
- Defending Digital Voices
- Development Agenda
- Digital Books
- Digital Radio
- Digital Video
- DMCA
- DMCA Rulemaking
- Do Not Track
- DRM
- E-Voting Rights
- EFF Europe
- Encrypting the Web
- Export Controls
- FAQs for Lodsys Targets
- File Sharing
- Fixing Copyright? The 2013-2014 Copyright Review Process
- FTAA
- Genetic Information Privacy
- Hollywood v. DVD
- How Patents Hinder Innovation (Graphic)
- International Privacy Standards
- Internet Governance Forum
- Law Enforcement Access
- Legislative Solutions for Patent Reform
- Locational Privacy
- Mandatory Data Retention
- Mandatory National IDs and Biometric Databases
- Mass Surveillance Technologies
- Medical Privacy
- National Security and Medical Information
- National Security Letters
- Net Neutrality
- No Downtime for Free Speech
- NSA Spying
- OECD
- Online Behavioral Tracking
- Open Access
- Open Wireless
- Patent Busting Project
- Patent Trolls
- Patents
- PATRIOT Act
- Pen Trap
- Policy Analysis
- Printers
- Public Health Reporting and Hospital Discharge Data
- Reading Accessibility
- Real ID
- RFID
- Search Engines
- Search Incident to Arrest
- Section 230 of the Communications Decency Act
- Social Networks
- SOPA/PIPA: Internet Blacklist Legislation
- Student and Community Organizing
- Surveillance and Human Rights
- Surveillance Drones
- Terms Of (Ab)Use
- Test Your ISP
- The "Six Strikes" Copyright Surveillance Machine
- The Global Network Initiative
- The Law and Medical Privacy
- Trans-Pacific Partnership Agreement
- Travel Screening
- TRIPS
- Trusted Computing
- Video Games
- Wikileaks
- WIPO
- Transparency
- Uncategorized