![]() ![]() So I am wondering - does it or doesn't it? This includes RAT Servers, RAT EditServers, RAT Clients, RAT Plugins, RAT DDoS Servers, FTP RATs, Droppers, Binded trojans, Packed Servers, Keyloggers, Spyware, Mail Trojans, Password Stealers, Internet Worms, mIRC Worms, Malicious DLLs, Monitors, Spyware, and many others. TDS essentially detects anything malicious that isn't a virus. Which kinds of malicious software does TDS detect? If keyloggers are not included in the database of TDS (which I didn't know) the only fair thing to do is to asterisk the program with that information.īut, now I am curious because of this from the TDS3 FAQ on the DCS website: It's hard to tell someone not to expect something in a certain tool, because if they were smart, they would have caught it with another tool. However, we have to remember that not even 5% of computer users care to run anything but an antivirus and a firewall as their "security".With that in mind, it is hard for me to scold someone for asking for solid protection from the most popular keylogging program in existense - Spector. I frankly agree with you that for Spector to end up on the computer of one of the Wilders regulars would give cause to pause. Hmmmmmm no quiet survalince on web cams or pc control or get file acess this is kinda weak compare to other comerchial spywaresĮverything you wrote is absolutely true - for the experienced and security-wise user. In addition, Spector Pro will actually examine what is being done and analyze it to see whether you should be NOTIFIED RIGHT AWAY - if something bad is happening to your loved ones while they are surfing the Internet.įinally, add in the ability to block specific web sites from being visited or block chat activity or block internet access altogether with Spector Pro's flexible Internet Access Blocking.Ĭombine seven recording tools with Internet access blocking and intelligent and instant alert notification when content you specify is encountered and you have the most powerful Internet monitoring and surveillance software you can buy anywhere.Ĭomplete Power. ![]() Then, add Program Recording and Peer to Peer File Recording (New in Version 5.0). Start with the Most Advanced Snapshot Recorder, Add ACTUAL Email Recording, PLUS ACTUAL Chat Recording, PLUS The World's Best Key Logger and Web Site Recording. The Most Intelligent Internet Monitoring and Surveillance Software available. Records Emails, Chats, IMs, Web Sites, Programs Run, Keystrokes Typed, Peer to Peer File Sharing, Screen Snapshots - Plus - Offers Internet Access Blocking and Instant Notification Alerts. The blue ones are System process, the Black are normal app, and the Red indicates "Hidden" process which "can" be trojan-like apps, although not necessarily like my screen capture program HyperSnap. Port Explorer though can give very detailed info. I am presuming you were concerned someone outside of your own environment being able to monitor the keylogger, not someone having physical access to your system to check.Īlso if you have a good firewall, it should also alert to all objects trying to access outside to net? ![]() Like Pilli said, the only ones that can verify yes/no would be DCS.įrom your post, you have it installed and:ī] did not know about it until something happened?Īnother thing you can use to monitor your system, is Port Explorer to examine what traffic is being generated. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |