Solved

logging or watching installations

Posted on 2004-09-16
4
131 Views
Last Modified: 2013-12-04
Does anyone know if there is a program out there that can log or show a realtime log of where programs are being installed.

A prime example would be the stealth mode installation of spector pro 5.

Where does it go???  and what gets installed??

I think this would be helpful for also completely removing other programs and their associated dlls.

I just cant seem to find what I am looking for with the keywords I am searching with in google.  Any info would be a good thing.

Thanks people
0
Comment
Question by:dheindl
  • 3
4 Comments
 
LVL 21

Accepted Solution

by:
jvuz earned 125 total points
ID: 12081924
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12592035
Thanx,, but just out curiosity, why a C?

Jvuz
0
 

Author Comment

by:dheindl
ID: 12593602
It doesnt quite work like I had expected.  Dont get me wrong.. it does work, but I was looking more for a program that will track the individual files which are installed.  In my question above, I was loking for a 'realtime' as it is happening kind of watcher.  That way you can watch or log the files that get installed with each application.  ie. when you install norton antivirus, where are all of the files that get installed?  I mean ALL of the files that the installer adds or changes.  Your suggestion does in fact show where some of the main exe files are located but what about the dll's which get put into the system32 folder or the kernel that gets modified or whatever else happens when norton gets installed.  I wanna know what they are putting on my machine and where they are sticking it.
So your answer is right but only part right.
Thanks though, at least you were kind enough to post.  Nobody else had any ideas.  Got any more?

-D
0
 
LVL 21

Expert Comment

by:jvuz
ID: 12593630
OK, thanx for the explanation.

For the moment, I don't have any other ideas, sorry.

Jvuz
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
This video shows how to quickly and easily add an email signature for all users on Exchange 2016. The resulting signature is applied on a server level by Exchange Online. The email signature template has been downloaded from: www.mail-signatures…

813 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now