How do I detect unauthorized monitoring of a personal workstation?

Posted on 2004-11-11
Last Modified: 2011-09-20
I have a client that uses her computer for business and personal matters.  Over the last month she has noticed that the IE history files indicate sites she has never been to, like hacker sites, spyware sites etc...  She may be just acting paranoid, however she would like me to install some kind of monitoring software that would provide information regarding whether the systems was being used, what files were being accessed and if her email was compromised.  More importantly, she would like to determine if perhaps the same kind of monitoring software were already installed and whether her activities were already being monitored.  This client owns a sucessful business and is currently going through a nasty divorce.  
Question by:sfletch1959

    Accepted Solution

    Visit this webisite: and download the completely free family keylogger. Unzip this download and install it on your clients computer system. The software will run you through the options to set such as stealth mode, what to monitor etc. Try it -great software. you can even have the results emailed to any email address!

    Hope this helps
    LVL 18

    Expert Comment

    Also, if she doesn't have one already...a software firewall such as Zone alarm.

    Expert Comment

    Does this work? If you'd prefer another keylogger - go to google click link to search for other useful keylogger tools - anything else, im happy to help.
    Hope this helps./

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
    If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now