Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

protect against keyloggers etc

Posted on 2003-11-06
3
Medium Priority
?
259 Views
Last Modified: 2013-12-04
What are the best tools to use for making sure my computer isn't being used by a sneaky hacker. After reading about what happened to Half Life 2, I'm curious what I can use to make sure no hidden processes are on my machine logging keystrokes, secretly ftp'ing logfiles and Word docs, etc.
0
Comment
Question by:ryansta
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
ghana earned 1244 total points
ID: 9696969
There are different types of applications that will help you to identify and remove those processes:
Most known are antivirus programs and personal firewalls. SpyBot and Ad-Aware are antispy and anti-adware software and are also able to detect some keyloggers.

SpyBot: http://beam.to/spybotsd
Ad-Aware: http://www.lavasoftusa.com/
0
 

Author Comment

by:ryansta
ID: 9697548
spybot... cool tool
0
 
LVL 11

Expert Comment

by:ghana
ID: 9699371
Yes it is. - Glad I could help you. Thanks for your rating!
0

Featured Post

Concerto's Cloud Advisory Services

Want to avoid the missteps to gaining all the benefits of the cloud? Learn more about the different assessment options from our Cloud Advisory team.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many people tend to confuse the function of a virus with the one of adware, this misunderstanding of the basic of what each software is and how it operates causes users and organizations to take the wrong security measures that would protect them ag…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
In response to a need for security and privacy, and to continue fostering an environment members can turn to for support, solutions, and education, Experts Exchange has created anonymous question capabilities. This new feature is available to our Pr…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Suggested Courses

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question