Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Computer Security and Scanning

Posted on 2007-12-05
1
Medium Priority
?
182 Views
Last Modified: 2013-12-04
Can anyone tell me how to scan my computer to see if some sort of spy ware or key logger is instaled? Not the run of the mill spyware, I have Symantic End Point as well as others for them what Im looking for is if some one may have got onto my computer and installed or setup somthing. Their are many that once installed wont show in program files dir, nor will they show in the add/remove.
0
Comment
Question by:GD_GRAY
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 1000 total points
ID: 20413580
The sysinternals site has three good tools for this; in order:

Process explorer - shows what is currently running. doesn't show dll injection and so forth:
http://www.microsoft.com/technet/sysinternals/ProcessesAndThreads/ProcessExplorer.mspx

Autoruns - shows what programs are set to autorun on machine boot:
http://www.microsoft.com/technet/sysinternals/ProcessesAndThreads/Autoruns.mspx

RootkitRevealer - shows any programs trying to hide themselves from the first two tools. this is the tool that was used to discover the sony rootkit being added by various music cds...:
http://www.microsoft.com/technet/sysinternals/Security/RootkitRevealer.mspx
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is a guide to the following problem (not exclusive but here) on Windows: Users need our support and we supporters often use global administrative accounts to do this. Using these accounts safely is a real challenge. Any admin who takes se…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Are you ready to place your question in front of subject-matter experts for more timely responses? With the release of Priority Question, Premium Members, Team Accounts and Qualified Experts can now identify the emergent level of their issue, signal…
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question