Solved

protect against keyloggers etc

Posted on 2003-11-06
3
253 Views
Last Modified: 2013-12-04
What are the best tools to use for making sure my computer isn't being used by a sneaky hacker. After reading about what happened to Half Life 2, I'm curious what I can use to make sure no hidden processes are on my machine logging keystrokes, secretly ftp'ing logfiles and Word docs, etc.
0
Comment
Question by:ryansta
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
ghana earned 311 total points
ID: 9696969
There are different types of applications that will help you to identify and remove those processes:
Most known are antivirus programs and personal firewalls. SpyBot and Ad-Aware are antispy and anti-adware software and are also able to detect some keyloggers.

SpyBot: http://beam.to/spybotsd
Ad-Aware: http://www.lavasoftusa.com/
0
 

Author Comment

by:ryansta
ID: 9697548
spybot... cool tool
0
 
LVL 11

Expert Comment

by:ghana
ID: 9699371
Yes it is. - Glad I could help you. Thanks for your rating!
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question