[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

logging or watching installations

Posted on 2004-09-16
4
Medium Priority
?
137 Views
Last Modified: 2013-12-04
Does anyone know if there is a program out there that can log or show a realtime log of where programs are being installed.

A prime example would be the stealth mode installation of spector pro 5.

Where does it go???  and what gets installed??

I think this would be helpful for also completely removing other programs and their associated dlls.

I just cant seem to find what I am looking for with the keywords I am searching with in google.  Any info would be a good thing.

Thanks people
0
Comment
Question by:dheindl
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 250 total points
ID: 12081924
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12592035
Thanx,, but just out curiosity, why a C?

Jvuz
0
 

Author Comment

by:dheindl
ID: 12593602
It doesnt quite work like I had expected.  Dont get me wrong.. it does work, but I was looking more for a program that will track the individual files which are installed.  In my question above, I was loking for a 'realtime' as it is happening kind of watcher.  That way you can watch or log the files that get installed with each application.  ie. when you install norton antivirus, where are all of the files that get installed?  I mean ALL of the files that the installer adds or changes.  Your suggestion does in fact show where some of the main exe files are located but what about the dll's which get put into the system32 folder or the kernel that gets modified or whatever else happens when norton gets installed.  I wanna know what they are putting on my machine and where they are sticking it.
So your answer is right but only part right.
Thanks though, at least you were kind enough to post.  Nobody else had any ideas.  Got any more?

-D
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12593630
OK, thanx for the explanation.

For the moment, I don't have any other ideas, sorry.

Jvuz
0

Featured Post

Cyber Threats to Small Businesses (Part 2)

The evolving cybersecurity landscape presents SMBs with a host of new threats to their clients, their data, and their bottom line. In part 2 of this blog series, learn three quick processes Webroot’s CISO, Gary Hayslip, recommends to help small businesses beat modern threats.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In today's information driven age, entrepreneurs have so many great tools and options at their disposal to help turn good ideas into a thriving business. With cloud-based online services, such as Amazon's Web Services (AWS) or Microsoft's Azure, bus…
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question