Security task manager

Discussion in 'other anti-malware software' started by Franklin, May 24, 2005.

Thread Status:
Not open for further replies.
  1. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
  2. muf

    muf Registered Member

    Joined:
    Dec 30, 2003
    Posts:
    926
    Location:
    Manchester, England
    I have been using it for about two years. I like it, especially at spotting things that are using stealth techniques. I don't expect it can spot a root kit but then again you need specialist software for that and even then it's not guaranteed it could be detected.

    Basically it rates processes by their 'risk' factor. For example if the process is hidden or recording keyboard inputs it will get a higher risk rating. I tested it on five keyloggers that i downloaded off the net and it rated them 100% risky. I can't remember the loggers i used as it was two years ago. My test criteria probably wasn't definitive. I installed one, ran it and started up STM and it said 100% risk. I did the same for the other four and it said 100% for them too.

    What you can do is add a trusted to the list of running processes once you know they are safe. So every time you start it up it will be a sea of green trusted processes. If anything new is present it will stand out like a sore thumb because it doesn't have a green trusted next to it and it will be highlighted in red with a risk rating. Great for spotting something that doesn't belong.

    One other test i did was to copy a program(in this case i did notepad.exe) and ran STM, then i rated notepad.exe as trusted. I then close STM and copied and pasted notepad.exe to another location on my hard drive. I then started that version of notepad.exe and re-ran STM. The new version showed up not trusted and with a rating highlighted in red. So it spotted it wasn't the same notepad.exe that had already been rated. So i expect it will spot processes/programs running that have the same name as something trusted. Good for spotting things masquarading as something else.

    All in all a program i like, i use and is great for giving an opinion on whats running and whether it's a potential risk.

    muf
     
    Last edited: May 24, 2005
  3. muf

    muf Registered Member

    Joined:
    Dec 30, 2003
    Posts:
    926
    Location:
    Manchester, England
    Piccy before running an unknown process.
     

    Attached Files:

    • STM1.jpg
      STM1.jpg
      File size:
      86.3 KB
      Views:
      147
  4. muf

    muf Registered Member

    Joined:
    Dec 30, 2003
    Posts:
    926
    Location:
    Manchester, England
    Result after starting an unknown process.
     

    Attached Files:

    • STM2.jpg
      STM2.jpg
      File size:
      86.7 KB
      Views:
      145
  5. richrf

    richrf Registered Member

    Joined:
    Dec 11, 2003
    Posts:
    1,907
    Hi Franklin,

    I use Security Task Manager for information and verification. It is dependable and has a good online module verification database.

    I do not use the companion Spy Protector real-time product because it seems like ProcessGuard and RegDefend provide enough protection. The Spy Protector options for blocking keyboard and other monitoring have to be re-applied after each start-up which I do not think is good.

    I think the basic product is free to try out. I think you might find it useful as an information gathering and verification tool. Let me know what you think, if you try it out.

    Rich
     
  6. dontbugme

    dontbugme Guest

    Another vote for STM. It's a very nice program that I use alot. It has come in very handy to find those nasty keyloggers and other kinds of malware. I would highly recommend it as an addition to any security setup.
     
  7. Franklin

    Franklin Registered Member

    Joined:
    May 12, 2005
    Posts:
    2,517
    Location:
    West Aussie
    Downloaded STM and gave it a whirl.Agree,it's quite a good addition to compliment my other security programs.Annoying popups to buy but that's to be expected from a trial.

    After ticking everthing safe a quick check should reveal any malaware running that is installed by stealth.Yeh,not bad at all.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.