Process explorer is a good tool.  I would also suggest autoruns,
tcpview and procmon.  With those tools you can identify any tcp/udp
ports that are connected to outbound/inbound connections, view any
unwanted objects running at startup that can't be seen in msconfig,
and hook any Windows API call that affects registry/process
memory/filesystem activity.  Maybe also rootkitrevealer to detect any
rootkits that may be installed.

-Josh

On 8/1/08, AJ ONeal <[EMAIL PROTECTED]> wrote:
> +1 Windows Defender. I've been impressed.
>
> AJ ONeal
>

Reply via email to