Software Information |
Monitoring Software Can be Used for Spying as Well
We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance. These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to. But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware? Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC. The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto. Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it. If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy. First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up. Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program. Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC). Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card. Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise. Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information". No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat. Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill. Learn more -- visit the company's websitehttp://www.anti-keyloggers.com
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Programming Language Migration Path While I was preparing some personal background information for a potential client, I was reviewing all the programming languages that I have had experience with. I list languages that I'm most experienced with on my resume. Linux Vs. Windows This article will not attempt to advocate the use of Linux over Windows or vice versa. I will try to present the differences and similarities between Linux and Windows in a fair manner. What is a Document Manager without Version History? Document Manager and Version HistoryIn previous articles I have discussed the usefulness of a document manager, such as groupware, in organizing document sharing. I have also discussed the role that a Version History plays in a good document manager. IT Strategy for Large Corporation: ERP/MRP/CRM, Unix/Linux/Windows, Microsoft/Java Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business System or CRM: Lotus Notes Domino, Oracle, DB2There are multiple opinions on building your established large business IT system. Some companies prefer to be "Microsoft shop", others prefer to stick to Java world. Spyware Definitions List The adware and spyware definitions list is very long. But the definitions listed below are the most common ones. Microsoft CRM Custom Design & Development: SDK, C#, SQL, Exchange, Integration, Crystal Reports Microsoft CRM is new player on the CRM software market. The whole conception behind CRM seems to be different. Spyware, What is it? Spyware, what it is and what it does. Basically, spyware is a program put on your computer usually after you have downloaded some kind of program or went to a certain site. Microsoft Great Plains: Service Business Customization & Integration Example Microsoft Business Solutions Great Plains might be considered as ERP platform, ready for customization and integration. Microsoft Business Solutions partner typically does one of the two things: specializes in the industry (in this case it goes for the nation-wide clientele) or specializes in the local or regional market. DVD Burning Tips CD and DVD replication is a process that works by creating discs from scratch. Not to be confused with duplication (the act of burning information onto readymade, commercially-available blank CD-Rs and DVD-Rs), replication relies on the use of molds to produce actual discs that already contain digital data. CRM and Customer Life Cycle Customer Relationship Management or CRM is a combination of enterprise strategies, business processes and information technologies used to learn more about customers' needs and behaviors in order to develop stronger relationships with them. CRM software systems automate many customer-related business tasks. Microsoft Great Plains e-Commerce - additional considerations for programmer Microsoft Great Plains, designed back in 1990th as database transferable and graphical platform independent ERP application - Great Plains Dynamics/Dynamics C/S+/eEnterprise. For eCommerce developer the most important is to understand Great Plains tables structure and business processes in Sales Order Processing, Accounts Receivables, Inventory Control (inventory items allocation, backordering, etc), posting to Bank Reconciliation and General Ledger. Demand More From Your Lead Tracking Software An integral part of any quality CRM system is lead tracking software. This is the part of the system that helps you gather customer data from your sales force. Microsoft Great Plains Subcontracting - Overview for Microsoft Business Solutions Partner Microsoft Business Solutions Great Plains is very popular ERP/MRP applications in the USA, Canada, UK, Australia, New Zealand, Middle East, South Africa, Latin America. Considering high number of new Microsoft Great Plains partners and the desire to subcontract occasional customization, integration and reporting projects, we would like to advise you on Microsoft Great Plains subcontracting guidelines, based on our experience in dealing with Great Plains VARsCandidates for subcontracting:? Great Plains Dexterity customizations - Dexterity was and still is the IDE and programming language of Great Plains, especially workstation thick interface. What You Should Know About Installing Screensavers Do you remember that frustrating feeling when you find an interesting screensaver and can't install it on your computer? This article will help you to never have it again.Back to when Windows 95 started to find its home on many computers there was just half a dozen of screensavers preinstalled with the system. Know-how in Microsoft Publisher For those who still don't know, Microsoft Publisher helps computer users to easily create, customize and publish materials such as flyers, brochures, catalogs, newsletters and websites. It provides tools to create professional and compelling marketing materials that will help you take your business further. Introduction To ISDN, Part III: PAP Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we know how the ISDN link comes up (interesting traffic), and some scenarios that might cause the link to stay up, we need to look at ISDN authentication schemes. The two methods Cisco certification candidates must be familiar with are PAP and CHAP. Microsoft Great Plains - Microsoft RMS Integration - overview Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS) are originally developed by different software vendors, who had no idea that in the remote future (now) these two applications will be owned by Microsoft and will need to be tightly integrated. Current integration between the two is not an easy thing. Great Plains Dexterity - Microsoft Great Plains Customization Overview Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics and eEnterprise are Dexterity-written applications. Also small business line: Microsoft Small Business Manager or Small Business Financials is written in Dexterity and uses the same code base as Great Plains. Instant Messenger Clients If you have been using the Internet for any amount of time you have probably used an instant messenger at some time or another. They allow you to talk to your friends, family and co-workers with the click of a button. Enterprise Resource Planning Overview ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief history of ERP, Why is it necessary, Market Leaders and the future of ERP.What is ERP?Enterprise Resource Planning or ERP is an industry term for integrated, multi-module application software packages that are designed to serve and support multiple business functions. |
home | site map | contact us |