
Monitoring file access on Windows - Information Security Stack …
monitoring of user opening, modifying (don't need to know what the changes were, just that a file was modified), copying, pasting and renaming files file access monitoring on shared drives …
defense - Is it acceptable to exclude folders in antivirus ...
Jun 2, 2022 · Reliability is another big issue. AV solutions make certain file operations fail hard and require the application to handle it, e.g. any file access needs to do a few retries for trivial …
privacy - How to deal with monitoring software on a personal PC …
Jun 2, 2024 · Instead, install a completely separate operating system, ideally on a separate disk, so that you can unplug the disk with the personal OS during work and ensure the monitoring …
file encryption - Would it be plausible to write your own anti …
Mar 24, 2016 · And if there are actually more elusive tactics employed, would they easily avoid detection if my own monitoring script relies on standard file-access monitoring? Side Notes in …
malware - Information Security Stack Exchange
May 31, 2021 · Can a “bad guy” spy on an android phone without installing spy apps (those apps that require payment)? By “spying”, I mean using key logger, screenshots, read messages and …
network - Detection of abnormal file access patterns - Information ...
Jun 8, 2016 · The challenges are to design a system that will collect file access behaviour, establish parameters or statistical patterns that can characterise normal usage, and then …
tampering - Prove log files weren't tampered with? - Information ...
Feb 1, 2019 · In addition, you can do file integrity monitoring on certain paths such as calculating the checksum of these files and on subsequent scans (on set intervals) re-calculate for any …
digital signature - How to make sure nobody has read this ...
Dec 2, 2015 · For example, suppose I made a file with my plaintext passwords and simply wanted to make sure that those bits have not been read by anyone. In principle, a hard disk controller …
Does legitimate tech support use remote control software?
Jul 3, 2020 · Companies like TeamViewer exist because of this reason. The risks of the software are: having a persistent "back door" into a system, but there are security measures in most …
mobile - Is it really possible to install spyware on a cell phone ...
2 A friend is concerned their phone may have spyware on it. A quick search on the web returns a lot of results for software/apps that you can buy to spy on someone's cell. Based on …