Software Information |
|
S is for Spying, Surveillance -- and for Software as Well
Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view. Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it. If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar). Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so. Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security. The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences. These two specific program functions are typical to spy programs: First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up. Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program. Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it. Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware. As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind. Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
|
RELATED ARTICLES
Importance of Coding Standards Programming Help for Beginners Keep Your Software Simple! A Review of EditPlus I like my software simple. If it's too complex or difficult to figure out, I don't use it. RFID: Strengthen the Position for SAP; United States SAP Inc., a global leader in client/server enterprise application software that for years been the backbone to RFID application has seen a 1,000% spike year-over-year in customers, interested in RFID deployment. Acting as a link to RFID data and business applications SAP expects great things further and expedites toward new horizons. Recent Studies Show that 9 out of 10 PCs Are Infected with Spyware Spyware and malware are large problems for Internet users today and can be both annoying and a real threat to you and your computer. There exist a number of different spy and malware of which some are relatively friendly and only spies on your surfing habits, while others like the Trojans can be used to corrupt your hard drive or steal your usernames and passwords. A Trojan can even be used to steal your identity by extracting all necessary information from your computer. The Tools and Features of Adobe Photoshop Adobe Photoshop is one of the world's leading graphics editing programs, developed by Adobe Systems. Available on Mac OS or PC, Photoshop is used as one of the leading image design programs for the World Wide Web. The most recent version of Photoshop, or Photoshop CS2, "bridges" between other Adobe products such as Image Ready, Illustrator, Premiere, After Effects, and Encore DVD to produce professional videos and DVDs. Photoshop uses a file format called a .PSD or .PDD to store multiple layers of an image. Recently Adobe released a program called Photoshop Elements in order to give a less expensive version of Photoshop with many of the same features. Although Adobe Photoshop is used primarily in doing touch-up for digital photos, it is also used for creating designs for web pages and professional companies. Linux Dual Boot-How To Format Just the thought of a duel-boot scares many people away, but over the years it's developed into an easier process. Most people are running Windows, so I'm assuming it's your choice of preference: Microsoft Great Plains implementation: Restaurants Supply Chain Management Example Microsoft Great Plains serves majority of US based horizontal and vertical markets. Being relatively flexible and customizable ? it can fit your specific business requirements with light or deep customization. You can have portion of the system customization done by your in-house developers (such tools as Modifier with VBA, MS SQL Server stored procedures, Crystal Reports do not require unique expertise) and the most critical and difficult part could be subcontracted ? especially Great Plains Dexterity. In this small article we would like to give you good example of customization scenarios, where client needs warehouse management, random weight purchasing and by-pond resale to end clients, barcoding. Implementing Microsoft CRM: setup and configuration ? notes for IT specialist Microsoft Business Solutions CRM is web-based CRM application, deploying all the spectrum of recent Microsoft technologies. We'll try to analyze different needs and implementation scenarios attributed to specific industries and business types, based on our experience. DVD Burning Tips CD and DVD replication is a process that works by creating discs from scratch. Not to be confused with duplication (the act of burning information onto readymade, commercially-available blank CD-Rs and DVD-Rs), replication relies on the use of molds to produce actual discs that already contain digital data. It is the preferred and recommended mode of mass production for quantities in excess of 500 units. Unofficial Windows 98 SE Service Pack 2.0 RC2 Microsoft has never released a service pack for Windows98 SE, but I made a Service Pack for Windows98 SE users. How To Identify, Cure and Prevent Spyware/Adware Infections Just when you thought you were Web savvy, one more privacy, security, and functionality issue crops up - spyware. Installed on your computer without your consent, spyware software monitors or controls your computer use. It may be used to send you pop-up ads, redirect your computer to websites, monitor your Internet surfing, or record your keystrokes, which, in turn, could lead to identity theft. Microsoft and Webmasters Does Microsoft care for Webmasters Spyware - The Internet Devil Of Our Times! Spyware and Adware infest over 90 percent of computers in use today. Internet linked computers has made it easy for spybots, adware, and trojans to infiltrate and compromise online privacy. Installed toolbars can also contribute to browser hijacking and spyware related problems. ERP Consulting: Microsoft Great Plains Partner Future Directions In the Clinton era the status quo was simple: you serve your local clients and if you want to expand your business ? open offices in other business metros. Great Plains Software was granting generous margins on the software sales and stimulated local leading VARs/Partners/Resellers with so-called orphan leads ? customers who lapsed in payment annual enhancement program or called Great Plains Software directly to comply about quality of service by their VAR. When Microsoft purchased Great Plains Software and formed Microsoft Great Plains Business Solutions (soon renamed into Microsoft Business Solutions) and acquired new ERP/MRP/accounting applications: Navision, Axapta, Solomon (Solomon Software was bought by Great Plains Software in the late 1990th). When Microsoft introduced Microsoft CRM ? it tried to change traditional partner reselling model, let's see what it is and why (this is our personal opinion ? we are trying to envision the future for generic ERP VAR) Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example Microsoft Business Solutions offers several ERP applications: Great Plains, Navision, Solomon and its own CRM solution ? Microsoft CRM. Targeting to automate all business operations, Microsoft CRM is now integrated with Microsoft Great Plains and in the close future it should have integration with Microsoft Navision. In this small article we'll show you business automation example, where Microsoft CRM and Great Plains are integrated and customized to fit Freight Forwarding business processes. 10 Programming Tips (1) Avoid using the same variable again and again for different purposes. Microsoft Great Plains Payroll Module Customization Scenarios It is now common thing when large corporation selects mid-market ERP or so-called standard functionality MRP solution as its corporate accounting system. Microsoft Business Solutions Great Plains is very good candidate. As all MBS ERPs it has MS SQL Server 2000/2005 database platform and allows you to deploy customizable and altered solution, serving large corporation HR department. If you use US / Canadian Payroll module as paycheck solution for internal employees ? you probably don't need custom logic. In this small article we'll show you the way of tailored integrated solution for nation-wide placement agency. Cisco Certification: Introduction To ISDN, Part V The major reason I recommend getting your hands on real Cisco equipment rather than a simulator is that real Cisco routers give you the chance to practice and learn show and debug commands. Can Group Collaboration Software Meet Business Needs? According to a survey conducted by InfoTrends/CAP Ventures entitled "Content-Centric Collaboration," 51 percent of businesspeople utilizing technology such as Microsoft Office and e-mail collaborate almost daily as a part of their business operations and need group collaboration software to support electronic collaboration. The Truth about Colossus: Are You Just A Magnetic Image? What is Colossus? |
home | site map |
© 2005 |