Solved

how detect spectorsoft

Posted on 2011-02-26
4
1,256 Views
Last Modified: 2012-05-11
is it possible to detect installation of spectorsoft on PC?
0
Comment
Question by:Eigerwalker
  • 2
4 Comments
 
LVL 11

Accepted Solution

by:
yelbaglf earned 200 total points
Comment Utility
http://spycop.com/product.html claims to be able to detect it.  

Also, Symantec can and will detect it.
http://www.symantec.com/security_response/writeup.jsp?docid=2003-080811-1930-99
0
 
LVL 47

Assisted Solution

by:dstewartjr
dstewartjr earned 50 total points
Comment Utility
0
 

Author Closing Comment

by:Eigerwalker
Comment Utility
don't know how valid a solution that is more than 3 years old.  would think that spectorsoft would have revised their program once uncloak method was published.   examined my computer for what was in the solution, and do not have any of the registry keys.  just don't know if that really resolves it due to age of the solution.   thanks
0
 
LVL 11

Expert Comment

by:yelbaglf
Comment Utility
Just wanted to add some additional info in case it's helpful...

When I've used Spectorsoft, it recommends setting exclusions in the AV client since some will detect it, including Symantec.  Also, Spectorsoft allows you to customize the keystroke combination, and in addition to this, a custom password is required to bring it out of stealth mode.

But as noted, if your AV software picks it up, it will disable or remove it completely.  
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This tutorial demonstrates a quick way of adding group price to multiple Magento products.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now