Learn how to a build a cloud-first strategyRegister Now


How do I detect unauthorized monitoring of a personal workstation?

Posted on 2004-11-11
Medium Priority
Last Modified: 2011-09-20
I have a client that uses her computer for business and personal matters.  Over the last month she has noticed that the IE history files indicate sites she has never been to, like hacker sites, spyware sites etc...  She may be just acting paranoid, however she would like me to install some kind of monitoring software that would provide information regarding whether the systems was being used, what files were being accessed and if her email was compromised.  More importantly, she would like to determine if perhaps the same kind of monitoring software were already installed and whether her activities were already being monitored.  This client owns a sucessful business and is currently going through a nasty divorce.  
Question by:sfletch1959
  • 2

Accepted Solution

crazycruz earned 500 total points
ID: 12560655
Visit this webisite: www.kmint21.com/download.html and download the completely free family keylogger. Unzip this download and install it on your clients computer system. The software will run you through the options to set such as stealth mode, what to monitor etc. Try it -great software. you can even have the results emailed to any email address!

Hope this helps
LVL 18

Expert Comment

ID: 12565149
Also, if she doesn't have one already...a software firewall such as Zone alarm.

Expert Comment

ID: 12572852
Does this work? If you'd prefer another keylogger - go to google click link to search for other useful keylogger tools - anything else, im happy to help. http://www.google.com/search?hl=en&q=free+keylogger
Hope this helps./

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
Securing your business data in current era should be your biggest priority. Numerous people are unaware of the fact that insiders commit more than 60 percent of security breaches. You need to figure out the underlying cause and invoke your potential…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question