Solved

logging or watching installations

Posted on 2004-09-16
4
129 Views
Last Modified: 2013-12-04
Does anyone know if there is a program out there that can log or show a realtime log of where programs are being installed.

A prime example would be the stealth mode installation of spector pro 5.

Where does it go???  and what gets installed??

I think this would be helpful for also completely removing other programs and their associated dlls.

I just cant seem to find what I am looking for with the keywords I am searching with in google.  Any info would be a good thing.

Thanks people
0
Comment
Question by:dheindl
  • 3
4 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 125 total points
ID: 12081924
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12592035
Thanx,, but just out curiosity, why a C?

Jvuz
0
 

Author Comment

by:dheindl
ID: 12593602
It doesnt quite work like I had expected.  Dont get me wrong.. it does work, but I was looking more for a program that will track the individual files which are installed.  In my question above, I was loking for a 'realtime' as it is happening kind of watcher.  That way you can watch or log the files that get installed with each application.  ie. when you install norton antivirus, where are all of the files that get installed?  I mean ALL of the files that the installer adds or changes.  Your suggestion does in fact show where some of the main exe files are located but what about the dll's which get put into the system32 folder or the kernel that gets modified or whatever else happens when norton gets installed.  I wanna know what they are putting on my machine and where they are sticking it.
So your answer is right but only part right.
Thanks though, at least you were kind enough to post.  Nobody else had any ideas.  Got any more?

-D
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12593630
OK, thanx for the explanation.

For the moment, I don't have any other ideas, sorry.

Jvuz
0

Featured Post

Better Security Awareness With Threat Intelligence

See how one of the leading financial services organizations uses Recorded Future as part of a holistic threat intelligence program to promote security awareness and proactively and efficiently identify threats.

Join & Write a Comment

No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
Security measures require Windows be logged in using Standard User login (not Administrator).  Yet, sometimes an application has to be run “As Administrator” from a Standard User login.  This paper describes how to create a shortcut icon to launch a…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now