Software Information |
|
Monitoring Software Can be Used for Spying as Well
We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance. These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to. But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware? Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC. The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto. Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it. If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy. First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up. Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program. Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC). Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card. Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise. Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information". No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat. Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection. Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill. Learn more -- visit the company's website http://www.anti-keyloggers.com
|
RELATED ARTICLES
Database Guru James F. Koopmann Reviews DBxtra Reporting and Query Tool DBxtra is a powerful query and reporting tool that hides many of the complexity and technical expertise required for creating connections to disperse data sources, building queries, designing reports, and delivery information throughout an enterprise or to your customer base. Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free? Heard about the Quark "killer"? Microsoft CRM Implementation for Large Corporation ? overview Microsoft Business Solutions CRM is now approaching the phase of being mature product and the CRM solution you may consider for large publicly traded company. Our view point considers the fact of multiple platforms and systems coexistence and balancing: UNIX, Linux, Microsoft Windows, Java, .Net, PC, AS/400, RS6000, Microsoft Exchange, Lotus Notes Domino, etc. This increases the cost of maintenance, but decreases the risk of being trapped to one vendor/solution. So far we've seen successful implementations of Microsoft CRM in the following industries: Distribution, Logistics, Non-Profit, Chemicals, Pharmaceutical, Placement/Recruiting, Medicare/Hospitals, Retail, Wholesale, Education, Beverages, Services, Defense, Aerospace, Oil & Gas. A Guide To Purchasing Professional XP Icons Online And Enhancing Your Applications Icons are used everywhere; right from software applications, to internet browsers, to operating systems to websites and even in print media. But businesses have to waste a good deal of money and time in manufacturing icons on their own. Professional icons are tough to create and need expertise in terms of creative artists, lots of time and software. But just as in any other field today, here again there are specialized organizations dedicated to manufacturing and supplying ready made icons. This article is meant for those of you who intent to purchase readymade XP icons for your applications RFID: Strengthen the Position for SAP; United States SAP Inc., a global leader in client/server enterprise application software that for years been the backbone to RFID application has seen a 1,000% spike year-over-year in customers, interested in RFID deployment. Acting as a link to RFID data and business applications SAP expects great things further and expedites toward new horizons. The Importance of Timely Timesheets Whether you are a small consultancy firm, a medium sized accountancy practice, or a code warrior for hire in a back room of your house then you have at least one thing in common: you are in business to get paid quickly, and for the work you have done. Timesheets are the usual method for tracking time you spent working and thus are the key to timely invoice generation. Timely invoice generation and despatch is important for two reasons: Microsoft Great Plains Integration Manager ? Working With Text File Microsoft Business Solutions main middle market ERP application - Microsoft Great Plains has multiple integration options: MS SQL Scripting (stored procedures and views), ADO.Net programming, Microsoft SQL Server DTS packages. You certainly can deploy such SDK tools as eConnect. However here we would like to show you how to program the simplest user friendly tool: Microsoft Great Plains Integration Manager. Multiple times in our consulting practice we saw the need to integrate General Ledger transactions from one text file and here we give you this and even more complex case, when credit and debit amounts are present on the same line with their own account numbers. Let's assume that we have tab delimited text file, GLSOURCE.txt. Here is how the line looks: Where to Find Free Fleet Maintenance Software Costs of fleet maintenance software can vary widely. It is generally expected that the fleet manager will look at the needs of the company to determine what software package is best suited for their particular needs. Depending upon the size of the company, number of vehicles to be maintained and services of the company, you may be able to locate free fleet management software for your needs. Understanding Document Management The term "document management" and "paperless office" is the subject of countless articles and books. Everyone wants to achieve this lofty goal but not everyone understands what the terms really mean. Before you can embark on the journey of achieving total document management, it's important that you have a good basic knowledge of the terms and concepts that go with it. Microsoft Business Solutions VAR/Partner Selection ? Overview for IT Director/Manager/Controller Microsoft Great Plains and Microsoft CRM become more and more popular, partly because of Microsoft muscles behind them. Now Great Plains is targeted to the whole spectrum of horizontal and vertical market clientele. Small companies use Small Business Manager (which is based on the same technology ? Great Plains Dexterity dictionary and runtime), Great Plains Standard on MSDE is for small to midsize clients, and then Great Plains serves the rest of the market up to big corporations. Microsoft CRM is extremely scalable and fits to all the market niches. Microsoft Great Plains Customization and Development ? Overview for Programmer When Great Plains Software was designing and developing Great Plains Dynamics/Dynamics CS+/eEnterprise - it placed several fundamental principles into the system Spyware Protection: A Must for Any Home Computer Now that spyware is the single most dangerous threat to home computers connected to the internet today, getting your hands on some sort of spyware and adware protection is critical. Spyware has outpaced computer viruses in its prevalence, and in the kind of damage it can do to your system. Microsoft Navision Integration with Microsoft RMS - Overview for IT Specialist Microsoft Business Solutions Navision serves both European and American megamarkets. It was originally written by Denmark-based Navision Software in its own proprietary language C/SIDE (Client/Server Integrated Development Environment). Currently Navision is supported on two platforms - Navision native (C/SIDE) database and on Microsoft SQL Server. In this small article we would like to give you the clue on Navision integration with Microsoft Retail Management System - Microsoft RMS. Not All Project Management Software is Created Equal The purpose of Project Management Software is to provide an environment in which a group of people can work together on joint projects. Most projects involve the development and implementation of new ideas, and these ideas have to be presented, evaluated, and revised. SQL: Querying Microsoft Great Plains ? Overview for Database Administrator/Developer � Two Reasons to Use Timesheet Software This short paper will expand on two key reasons to move to a computerized timesheet system at your company. There are more than two reasons of course, but these will be expanded on at a later date. The two key reasons to be discussed here are Timesheet Efficiency, and Timesheet Automation. Keeping Track One of the things we can be as certain of as death and taxes is that in every meeting at least one person will hand out a document for comments and discussion. But think of the huge workload this gives rise to for the author. She can only hope that not too many people respond, or that they don't all do so at once! How to Get The Best Accounting Software For Your Small Business Buying accounting software is a major investment. It's an important decision and you need to be sure of all the facts before you buy. Most Dangerous Types of Spyware are on the Rise: How to Choose the Weapon Bad News - the Threat is Bigger than it Seemed Preventive Maintenance Software Companies Several software companies design programs for preventive maintenance. Most of the preventive maintenance software companies produce programs for facilities and businesses. Because many programs are adaptable, they can be used for different types of facilities. Some of the best know preventive maintenance software companies are SMGlobal, Inc., Sigma Data Systems, Inc., and Smartware Group. |
home | site map |
© 2005 |