[Last Call] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

how detect spectorsoft

Posted on 2011-02-26
4
Medium Priority
?
1,313 Views
Last Modified: 2012-05-11
is it possible to detect installation of spectorsoft on PC?
0
Comment
Question by:Eigerwalker
  • 2
4 Comments
 
LVL 11

Accepted Solution

by:
yelbaglf earned 600 total points
ID: 34990129
http://spycop.com/product.html claims to be able to detect it.  

Also, Symantec can and will detect it.
http://www.symantec.com/security_response/writeup.jsp?docid=2003-080811-1930-99
0
 
LVL 47

Assisted Solution

by:Donald Stewart
Donald Stewart earned 150 total points
ID: 34990147
0
 

Author Closing Comment

by:Eigerwalker
ID: 34990278
don't know how valid a solution that is more than 3 years old.  would think that spectorsoft would have revised their program once uncloak method was published.   examined my computer for what was in the solution, and do not have any of the registry keys.  just don't know if that really resolves it due to age of the solution.   thanks
0
 
LVL 11

Expert Comment

by:yelbaglf
ID: 34990293
Just wanted to add some additional info in case it's helpful...

When I've used Spectorsoft, it recommends setting exclusions in the AV client since some will detect it, including Symantec.  Also, Spectorsoft allows you to customize the keystroke combination, and in addition to this, a custom password is required to bring it out of stealth mode.

But as noted, if your AV software picks it up, it will disable or remove it completely.  
0

Featured Post

When ransomware hits your clients, what do you do?

MSPs: Endpoint security isn’t enough to prevent ransomware.
As the impact and severity of crypto ransomware attacks has grown, Webroot has fought back, not just by building a next-gen endpoint solution capable of preventing ransomware attacks but also by being a thought leader.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware - Defeated! Client opened the wrong email and was attacked by Ransomware. I was able to use file recovery utilities to find shadow copies of the encrypted files and make a complete recovery.
Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

830 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question