Re: Tracking a (potential) abuser?

From: Tom Bowers (bowerstat_private)
Date: Thu Feb 06 2003 - 12:03:03 PST

  • Next message: Jason Powell: "Re: Tracking a (potential) abuser?"

    I am involved in doing similiar tasks for my company on a global basis. We usually start with loading a keystroke logger. The one we use is Winguardian
     ( www.webroot.com )($39,95). It logs keystrokes, websites and takes pictures every few minutes of the screen. All of this is done behind the scenes and is very difficult to detect (ie - it doesn't show up as a running task or service). We use this as our starting point for active investigations. It gives you their passwords and allows you to reconstruct their motives. Great program, I used it at home with both my teenagers to discourage inappropriate behavior.
    
    Respectfully,
    
    Tom Bowers, CISSP
    Desktop Security Specialist
    Wyeth Pharmaceuticals
    484-563-2063
    
    
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Thu Feb 06 2003 - 18:23:37 PST