About 399 results
Open links in new tab
  1. Monitoring file access on Windows - Information Security Stack …

    monitoring of user opening, modifying (don't need to know what the changes were, just that a file was modified), copying, pasting and renaming files file access monitoring on shared drives …

  2. defense - Is it acceptable to exclude folders in antivirus ...

    Jun 2, 2022 · Reliability is another big issue. AV solutions make certain file operations fail hard and require the application to handle it, e.g. any file access needs to do a few retries for trivial …

  3. privacy - How to deal with monitoring software on a personal PC …

    Jun 2, 2024 · Instead, install a completely separate operating system, ideally on a separate disk, so that you can unplug the disk with the personal OS during work and ensure the monitoring …

  4. file encryption - Would it be plausible to write your own anti …

    Mar 24, 2016 · And if there are actually more elusive tactics employed, would they easily avoid detection if my own monitoring script relies on standard file-access monitoring? Side Notes in …

  5. malware - Information Security Stack Exchange

    May 31, 2021 · Can a “bad guy” spy on an android phone without installing spy apps (those apps that require payment)? By “spying”, I mean using key logger, screenshots, read messages and …

  6. network - Detection of abnormal file access patterns - Information ...

    Jun 8, 2016 · The challenges are to design a system that will collect file access behaviour, establish parameters or statistical patterns that can characterise normal usage, and then …

  7. tampering - Prove log files weren't tampered with? - Information ...

    Feb 1, 2019 · In addition, you can do file integrity monitoring on certain paths such as calculating the checksum of these files and on subsequent scans (on set intervals) re-calculate for any …

  8. digital signature - How to make sure nobody has read this ...

    Dec 2, 2015 · For example, suppose I made a file with my plaintext passwords and simply wanted to make sure that those bits have not been read by anyone. In principle, a hard disk controller …

  9. Does legitimate tech support use remote control software?

    Jul 3, 2020 · Companies like TeamViewer exist because of this reason. The risks of the software are: having a persistent "back door" into a system, but there are security measures in most …

  10. mobile - Is it really possible to install spyware on a cell phone ...

    2 A friend is concerned their phone may have spyware on it. A quick search on the web returns a lot of results for software/apps that you can buy to spy on someone's cell. Based on …