
Monitoring file access on Windows - Information Security Stack Exchange
monitoring of user opening, modifying (don't need to know what the changes were, just that a file was modified), copying, pasting and renaming files file access monitoring on shared drives that user has …
windows - Need a software that can monitor and log network traffic of ...
I need to monitor and log network activities of a specific software installed on my system. I know there are lots of network monitoring software out there, even system explorer has one built in. I need a …
defense - Is it acceptable to exclude folders in antivirus ...
Jun 2, 2022 · Reliability is another big issue. AV solutions make certain file operations fail hard and require the application to handle it, e.g. any file access needs to do a few retries for trivial stuff. That …
Does legitimate tech support use remote control software?
Jul 3, 2020 · Companies like TeamViewer exist because of this reason. The risks of the software are: having a persistent "back door" into a system, but there are security measures in most software to …
file encryption - Would it be plausible to write your own anti-crypto ...
Mar 24, 2016 · And if there are actually more elusive tactics employed, would they easily avoid detection if my own monitoring script relies on standard file-access monitoring? Side Notes in regards to what I …
privacy - How to deal with monitoring software on a personal PC used ...
Jun 2, 2024 · Instead, install a completely separate operating system, ideally on a separate disk, so that you can unplug the disk with the personal OS during work and ensure the monitoring software …
How do I log everything a certain program is doing?
Is there any possibility to log what this program is doing (maybe which file he is accessing and which website he is visiting (also what this website is returning) I mean a program that is logging which file …
network - Detection of abnormal file access patterns - Information ...
Jun 8, 2016 · The challenges are to design a system that will collect file access behaviour, establish parameters or statistical patterns that can characterise normal usage, and then implement a real …
malware - Information Security Stack Exchange
May 31, 2021 · Can a “bad guy” spy on an android phone without installing spy apps (those apps that require payment)? By “spying”, I mean using key logger, screenshots, read messages and so on. Is it …
What ways can you monitor all changes made on a Linux server?
Sep 19, 2019 · Two different approaches could be used. File integrity monitoring. Host based intrusion detection software such as AIDE can be configured to record hashes of important files on the system …