Antivirus, Application security, Authentication, backdoors, Biometrics, Current threats, cybersecurity, Data breach, Data-security, Digital certificates, Disaster recovery planning, Encryption, filtering, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Identity management, Incident response, Information security, Intrusion management, ISA Server, IT security, malware, McAfee, Microsoft patches, Microsoft Security, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security Program Management, Security tokens, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
A WhatIs.com member wants to know: Is there any "test" one can do to see if a Keylogger program has been accidentally downloaded as a result of installing a new program? How can you find out if a Keylogger program is on your system?
is it possible to find evidence of a trojan horse such as a key logger on a laptop hard drive. If so do you know of any firms in nyc that can do this ?
I need a way to log the key strokes of an AS/400 user (on green screen). I want to know everything entered, including menu option numbers entered on