Security Basics mailing list archives

Re: Capturing a programs file output.


From: Nelson Santos <nsantos () gmail com>
Date: Wed, 18 Aug 2004 09:40:03 -0300

Can't you do that with Windows security auditing features (GPO)?

Nelson

On Mon, 16 Aug 2004 15:53:56 -0400, CHRIS GRABENSTEIN
<cgrabenstein () lfcc edu> wrote:
Take a look at FileMon from Sysinternals.  I'm not sure it'll show you
everything you want, but it's a great start.  Version 6.1 was released
3/2004.
http://www.sysinternals.com/ntw2k/source/filemon.shtml



-----Original Message-----
From: mop [mailto:mop () arach net au]
Sent: Sunday, August 15, 2004 2:27 AM
To: security-basics
Subject: Capturing a programs file output.

Hi

Can anyone suggest a freeware tool for Windows that can log:

a) The file access of a selected application, such as opening,/closing of
files, what is written, and if possible the offset the write occured at.
b) Access to a selected file by any application.

Either capability would be useful, but preferably both. Timestamping would
also be helpful.

Thanks.

Kim Morfitt

---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field pen
testing experience in our state of the art hacking lab. Master the skills of
an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------

---------------------------------------------------------------------------
Ethical Hacking at the InfoSec Institute. Mention this ad and get $545 off
any course! All of our class sizes are guaranteed to be 10 students or less
to facilitate one-on-one interaction with one of our expert instructors.
Attend a course taught by an expert instructor with years of in-the-field
pen testing experience in our state of the art hacking lab. Master the skills
of an Ethical Hacker to better assess the security of your organization.
Visit us at:
http://www.infosecinstitute.com/courses/ethical_hacking_training.html
----------------------------------------------------------------------------



---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.securityfocus.com/sponsor/InfoSecInstitute_security-basics_040817
----------------------------------------------------------------------------


Current thread: