Solved

logging or watching installations

Posted on 2004-09-16
4
130 Views
Last Modified: 2013-12-04
Does anyone know if there is a program out there that can log or show a realtime log of where programs are being installed.

A prime example would be the stealth mode installation of spector pro 5.

Where does it go???  and what gets installed??

I think this would be helpful for also completely removing other programs and their associated dlls.

I just cant seem to find what I am looking for with the keywords I am searching with in google.  Any info would be a good thing.

Thanks people
0
Comment
Question by:dheindl
  • 3
4 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 125 total points
ID: 12081924
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12592035
Thanx,, but just out curiosity, why a C?

Jvuz
0
 

Author Comment

by:dheindl
ID: 12593602
It doesnt quite work like I had expected.  Dont get me wrong.. it does work, but I was looking more for a program that will track the individual files which are installed.  In my question above, I was loking for a 'realtime' as it is happening kind of watcher.  That way you can watch or log the files that get installed with each application.  ie. when you install norton antivirus, where are all of the files that get installed?  I mean ALL of the files that the installer adds or changes.  Your suggestion does in fact show where some of the main exe files are located but what about the dll's which get put into the system32 folder or the kernel that gets modified or whatever else happens when norton gets installed.  I wanna know what they are putting on my machine and where they are sticking it.
So your answer is right but only part right.
Thanks though, at least you were kind enough to post.  Nobody else had any ideas.  Got any more?

-D
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12593630
OK, thanx for the explanation.

For the moment, I don't have any other ideas, sorry.

Jvuz
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
OfficeMate Freezes on login or does not load after login credentials are input.
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now