The most simple way for the potential intruders is to write something into startup section of the registry. A number of trojans work this way. This can be done via network, without being physically present at the attacked computer! Having tested our Windows network we discovered that a half of all workstations had their registry open for everyone! The system registry has some vital keys which, if tampered with, make a security breach, destroy data. You can easily monitor the registry on the local or remote computer with our AxTNTRegSecurity control. It is another descendant of the common ancestor of all components which deal with different aspects of Windows NT
Screenshots are not available currently.
What's New in AxNTRegSecurity 2.06
Release notes are not available currently.
No additional system requirements.