Question Tracking Specific Software

RMassoudi

Distinguished
Apr 15, 2011
66
1
18,635
Hello all,

Is there a way to determine which software was activated on my computer at a specific time? I'm concerned about potential hidden tracking software and would like to identify it.

Thank you!
 
Solution
If you suspect this it would likely be a good idea to blow out the drives (format) and reinstall everything, update all passwords to everything.

A person that knew what they were doing with physical access (and in some cases remote/online access) with the right privileges could have installed something that you aren't going to find outside a forensic study of the system drives.

edit- and just being completely fair about the implications....according to who you are and what you do, if someone had physical access to your location there could be additional devices installed in or near your location. This assumes that the effort, expense, and legality of said were worth the cost and/or risk based against what information you (might) have...

punkncat

Polypheme
Ambassador
If you suspect this it would likely be a good idea to blow out the drives (format) and reinstall everything, update all passwords to everything.

A person that knew what they were doing with physical access (and in some cases remote/online access) with the right privileges could have installed something that you aren't going to find outside a forensic study of the system drives.

edit- and just being completely fair about the implications....according to who you are and what you do, if someone had physical access to your location there could be additional devices installed in or near your location. This assumes that the effort, expense, and legality of said were worth the cost and/or risk based against what information you (might) have that they want. If this is a "cheating spouse" type thing, and I am not assuming anything, then the blow out should be sufficient to ease your concerns.
 
  • Like
Reactions: RMassoudi
Solution

Ralston18

Titan
Moderator
Late thought/entry.

Look in the Event Viewer logs.

The logs may have captured some "software activation" or similar activity.

However; that said, if the software was malignant then the software may have prevented or hidden incriminating evidence and actions.

Therefore, as suggested: full wipe and reinstall.
 
  • Like
Reactions: RMassoudi