Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Search results for query: *

  1. ucjb2005

    Spyware removal using Login scripts

    I am using WMI, I have a database with the registry run keys, with the associated EXE and the folder if any. Using WMI I kill the process(s) then delete the EXE and the folder. Then with registry file and GPOs I lock the PC down so the user can not download anything from the web. I built a web...
  2. ucjb2005

    Keeping spyware off users' computers

    I am using WMI, I have a database with the registry run keys, with the associated EXE and the folder if any. Using WMI I kill the process(s) then delete the EXE and the folder. Then with registry file and GPOs I lock the PC down so the user can not download anything from the web. I built a web...
  3. ucjb2005

    Keeping spyware off users' computers

    Br0ck, do you want the code or do you want more details?
  4. ucjb2005

    Keeping spyware off users' computers

    I work for a school system and I have created a spyware removal progam that runs when the users log on to our network, it works like a dream. Not only will it get rid of spyware but any other application that you don't want to run. I used Visual Basic and SQL Server database.
  5. ucjb2005

    Spyware removal using Login scripts

    I work for a school system and I have created a spyware removal progam that runs when the users log on to our network, it works like a dream. Not only will it get rid of spyware but any other application that you don't want to run.

Part and Inventory Search

Back
Top