?
Solved

protect against keyloggers etc

Posted on 2003-11-06
3
Medium Priority
?
261 Views
Last Modified: 2013-12-04
What are the best tools to use for making sure my computer isn't being used by a sneaky hacker. After reading about what happened to Half Life 2, I'm curious what I can use to make sure no hidden processes are on my machine logging keystrokes, secretly ftp'ing logfiles and Word docs, etc.
0
Comment
Question by:ryansta
  • 2
3 Comments
 
LVL 11

Accepted Solution

by:
ghana earned 1244 total points
ID: 9696969
There are different types of applications that will help you to identify and remove those processes:
Most known are antivirus programs and personal firewalls. SpyBot and Ad-Aware are antispy and anti-adware software and are also able to detect some keyloggers.

SpyBot: http://beam.to/spybotsd
Ad-Aware: http://www.lavasoftusa.com/
0
 

Author Comment

by:ryansta
ID: 9697548
spybot... cool tool
0
 
LVL 11

Expert Comment

by:ghana
ID: 9699371
Yes it is. - Glad I could help you. Thanks for your rating!
0

Featured Post

The 14th Annual Expert Award Winners

The results are in! Meet the top members of our 2017 Expert Awards. Congratulations to all who qualified!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
This video tutorial shows you the steps to go through to set up what I believe to be the best email app on the android platform to read Exchange mail.  Get the app on your phone: The first step is to make sure you have the Samsung Email app on your …
Get the source code for a fully functional Access application shell with several popular security features that Access VBA application developers desire, but find difficult or impossible to figure out how to code. You get the source code for managi…
Suggested Courses

601 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question