D
DrMicro
I run a small IT consulting business and several programs
I maintain and/or evaluate for some of my corporate
customers who want to be able to keep track of what threir
employees are doing on their dime include keyloggers,
remote admin tools, screenshot ftp clients, etc.
Here's my problem and my question: If I place a program
in "ignore always" status, and then run Microsoft's
antispyware program on another customer's hard drive that
I have temporarily installed in my isolated test network,
will it detect UNWANTED components of the same program,
origin or type that I have previously placed in "always
ignore" status, but from another source location?
I maintain and/or evaluate for some of my corporate
customers who want to be able to keep track of what threir
employees are doing on their dime include keyloggers,
remote admin tools, screenshot ftp clients, etc.
Here's my problem and my question: If I place a program
in "ignore always" status, and then run Microsoft's
antispyware program on another customer's hard drive that
I have temporarily installed in my isolated test network,
will it detect UNWANTED components of the same program,
origin or type that I have previously placed in "always
ignore" status, but from another source location?