G
Guest
How can I defend or discover if a "rootkit" has been installed on a Windows
x64 system?
Is there any software that can validate the startup and core operating
system files in general? The online update process does not appear to do
enough system analysis, even if one is willing to wait a few hours while a
system check is being run. I am looking for an answer other than following a
system backup policy.
Are there any suggestions for how to monitor "keylogging" software. The
Wall Street Journal reported this kind of software is becoming common in
South America. How can one produce a minimum-sized evidence trail to record
such network intrusions?
Thanks.
x64 system?
Is there any software that can validate the startup and core operating
system files in general? The online update process does not appear to do
enough system analysis, even if one is willing to wait a few hours while a
system check is being run. I am looking for an answer other than following a
system backup policy.
Are there any suggestions for how to monitor "keylogging" software. The
Wall Street Journal reported this kind of software is becoming common in
South America. How can one produce a minimum-sized evidence trail to record
such network intrusions?
Thanks.