Skip to Content
Combating Spyware in the Enterprise
book

Combating Spyware in the Enterprise

by Paul Piccard
August 2006
Intermediate to advanced
448 pages
16h 8m
English
Syngress
Content preview from Combating Spyware in the Enterprise
Forensic Detection and Removal Chapter 6 253
take a little while, as it has to analyze every bit of information in the virtual
machine. You should create a snapshot immediately after booting a test com-
puter so that you have a set starting point to which to return.
After creating a snapshot, work with the operating system as normal.
Install common spyware detection tools such as HijackThis and perform basic
scans for spyw^are components. As you attempt to remove components and
you document your actions, you may notice that spyware applications may
confound your attempts and infect the workstation all over again. In this case,
you can simpl ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

How Personal & Internet Security Work

How Personal & Internet Security Work

Preston Gralla
What Employees Want Most in Uncertain Times

What Employees Want Most in Uncertain Times

Kristine W. Powers, Jessica B.B. Diaz
Advances in Biometrics for Secure Human Authentication and Recognition

Advances in Biometrics for Secure Human Authentication and Recognition

Dakshina Ranjan Kisku, Phalguni Gupta, Jamuna Kanta Sing

Publisher Resources

ISBN: 9781597490641