Process explorer is a good tool. I would also suggest autoruns, tcpview and procmon. With those tools you can identify any tcp/udp ports that are connected to outbound/inbound connections, view any unwanted objects running at startup that can't be seen in msconfig, and hook any Windows API call that affects registry/process memory/filesystem activity. Maybe also rootkitrevealer to detect any rootkits that may be installed.
-Josh On 8/1/08, AJ ONeal <[EMAIL PROTECTED]> wrote: > +1 Windows Defender. I've been impressed. > > AJ ONeal >
