Posted on 2011-03-02
A client is suspicious that an estranged spouse has installed keylogging software or something similar on a laptop, and has asked to have it checked for such. I plan to take the usual steps used for malware and rootkit detection. Also, I have a little experience with eBlaster and will attemp to look for that.
I am looking for suggestions beyond what I plan to do to help do a more thorough job. This is not what I normally do and am no expert in this area.