Solved

protect against keyloggers etc

Posted on 2003-11-06
3
251 Views
Last Modified: 2013-12-04
What are the best tools to use for making sure my computer isn't being used by a sneaky hacker. After reading about what happened to Half Life 2, I'm curious what I can use to make sure no hidden processes are on my machine logging keystrokes, secretly ftp'ing logfiles and Word docs, etc.
0
Comment
Question by:ryansta
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
ghana earned 311 total points
ID: 9696969
There are different types of applications that will help you to identify and remove those processes:
Most known are antivirus programs and personal firewalls. SpyBot and Ad-Aware are antispy and anti-adware software and are also able to detect some keyloggers.

SpyBot: http://beam.to/spybotsd
Ad-Aware: http://www.lavasoftusa.com/
0
 

Author Comment

by:ryansta
ID: 9697548
spybot... cool tool
0
 
LVL 11

Expert Comment

by:ghana
ID: 9699371
Yes it is. - Glad I could help you. Thanks for your rating!
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question