About 600 results
Open links in new tab
  1. Monitoring file access on Windows - Information Security Stack …

    monitoring of user opening, modifying (don't need to know what the changes were, just that a file was modified), copying, pasting and renaming files file access monitoring on shared drives …

  2. windows - Need a software that can monitor and log network …

    I need to monitor and log network activities of a specific software installed on my system. I know there are lots of network monitoring software out there, even system explorer has one built in. I …

  3. defense - Is it acceptable to exclude folders in antivirus ...

    Jun 2, 2022 · Reliability is another big issue. AV solutions make certain file operations fail hard and require the application to handle it, e.g. any file access needs to do a few retries for trivial …

  4. Does legitimate tech support use remote control software?

    Jul 3, 2020 · Companies like TeamViewer exist because of this reason. The risks of the software are: having a persistent "back door" into a system, but there are security measures in most …

  5. privacy - How to deal with monitoring software on a personal PC …

    Jun 2, 2024 · Instead, install a completely separate operating system, ideally on a separate disk, so that you can unplug the disk with the personal OS during work and ensure the monitoring …

  6. network - Detection of abnormal file access patterns - Information ...

    Jun 9, 2016 · The challenges are to design a system that will collect file access behaviour, establish parameters or statistical patterns that can characterise normal usage, and then …

  7. file encryption - Would it be plausible to write your own anti …

    Mar 24, 2016 · The question is more directed at why there are not already more anti-crypto-ransomware tools, given that their approach could actually be detected with some basic file …

  8. digital signature - How to make sure nobody has read this ...

    Dec 2, 2015 · For example, suppose I made a file with my plaintext passwords and simply wanted to make sure that those bits have not been read by anyone. In principle, a hard disk controller …

  9. firewalls - Identify if files are being transferred from my computer ...

    Nov 9, 2013 · 3 No chance. If the spyware encrypts the traffic, you can not see what has been transmitted. The only thing you can do is monitoring which program opens which file. That can …

  10. How do I log everything a certain program is doing?

    In case you are using Windows, you can use Process Monitor to find out which files and registry entries the software is accessing. And for the sites it is visiting (request and responses) you …