?
Solved

Computer Security and Scanning

Posted on 2007-12-05
1
Medium Priority
?
181 Views
Last Modified: 2013-12-04
Can anyone tell me how to scan my computer to see if some sort of spy ware or key logger is instaled? Not the run of the mill spyware, I have Symantic End Point as well as others for them what Im looking for is if some one may have got onto my computer and installed or setup somthing. Their are many that once installed wont show in program files dir, nor will they show in the add/remove.
0
Comment
Question by:GD_GRAY
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 1000 total points
ID: 20413580
The sysinternals site has three good tools for this; in order:

Process explorer - shows what is currently running. doesn't show dll injection and so forth:
http://www.microsoft.com/technet/sysinternals/ProcessesAndThreads/ProcessExplorer.mspx

Autoruns - shows what programs are set to autorun on machine boot:
http://www.microsoft.com/technet/sysinternals/ProcessesAndThreads/Autoruns.mspx

RootkitRevealer - shows any programs trying to hide themselves from the first two tools. this is the tool that was used to discover the sony rootkit being added by various music cds...:
http://www.microsoft.com/technet/sysinternals/Security/RootkitRevealer.mspx
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as the high-speed power of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
OfficeMate Freezes on login or does not load after login credentials are input.
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
In this video, Percona Solution Engineer Rick Golba discuss how (and why) you implement high availability in a database environment. To discuss how Percona Consulting can help with your design and architecture needs for your database and infrastr…
Suggested Courses
Course of the Month14 days, 21 hours left to enroll

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question