Access control, Antivirus, Antivirus software, Application security, Auditing, Authentication, Biometrics, Current threats, cybersecurity, Digital certificates, Encryption, Endpoint security, Firewall, Firewalls, Forensics, Hacking, Identity & Access Management, Incident response, Information risk management, Information security, Intrusion management, ISA Server, malware, McAfee, Password, Patch management, patching, PEN testing, Platform Security, Risk management, Secure Coding, Security in 2010, Security management, Security products, Security Program Management, Security tokens, SFTP, Single sign-on, Spyware, SSL, SSL/TLS, Symantec, Trojans, User Permissions, Veritas, Viruses, vulnerability management, Web security, Windows Security, worms VIEW ALL TAGS
A WhatIs.com member wants to know: Is there any "test" one can do to see if a Keylogger program has been accidentally downloaded as a result of installing a new program? How can you find out if a Keylogger program is on your system?
is it possible to find evidence of a trojan horse such as a key logger on a laptop hard drive. If so do you know of any firms in nyc that can do this ?
I need a way to log the key strokes of an AS/400 user (on green screen). I want to know everything entered, including menu option numbers entered on