Solved

how detect spectorsoft

Posted on 2011-02-26
4
1,284 Views
Last Modified: 2012-05-11
is it possible to detect installation of spectorsoft on PC?
0
Comment
Question by:Eigerwalker
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 11

Accepted Solution

by:
yelbaglf earned 200 total points
ID: 34990129
http://spycop.com/product.html claims to be able to detect it.  

Also, Symantec can and will detect it.
http://www.symantec.com/security_response/writeup.jsp?docid=2003-080811-1930-99
0
 
LVL 47

Assisted Solution

by:Donald Stewart
Donald Stewart earned 50 total points
ID: 34990147
0
 

Author Closing Comment

by:Eigerwalker
ID: 34990278
don't know how valid a solution that is more than 3 years old.  would think that spectorsoft would have revised their program once uncloak method was published.   examined my computer for what was in the solution, and do not have any of the registry keys.  just don't know if that really resolves it due to age of the solution.   thanks
0
 
LVL 11

Expert Comment

by:yelbaglf
ID: 34990293
Just wanted to add some additional info in case it's helpful...

When I've used Spectorsoft, it recommends setting exclusions in the AV client since some will detect it, including Symantec.  Also, Spectorsoft allows you to customize the keystroke combination, and in addition to this, a custom password is required to bring it out of stealth mode.

But as noted, if your AV software picks it up, it will disable or remove it completely.  
0

Featured Post

On Demand Webinar - Networking for the Cloud Era

This webinar discusses:
-Common barriers companies experience when moving to the cloud
-How SD-WAN changes the way we look at networks
-Best practices customers should employ moving forward with cloud migration
-What happens behind the scenes of SteelConnect’s one-click button

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

732 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question