We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance.
These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to.
But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware?
Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC.
The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto.
Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it.
If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy.
First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC).
Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card.
Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise.
Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information".
No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat.
Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill.
Learn more -- visit the company's website http://www.anti-keyloggers.com
best cleaning company Highland Park ..Intro This concise article will tell you in plain English... Read More
Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More
If you are to buy a HelpDesk & Asset Management... Read More
If you are in a business that passes documents around... Read More
Microsoft Business Solutions is emerging as very attractive vendor for... Read More
Before being able to choose a secure Internet communication system,... Read More
Microsoft Great Plains is main accounting / ERP application... Read More
Now is the time to look at an alternative to... Read More
Whether you are a small consultancy firm, a medium sized... Read More
Remember old good days when your company probably had Great... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
IBM Lotus Domino or Microsoft Exchange?The severe competition continues for... Read More
With any good luck and a good amount of hard... Read More
Adobe Photoshop is one of the world's leading graphics editing... Read More
Linux essentials:It's free for download but you have to pay... Read More
2005 ? Back to the Future.What does the future hold?... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
The stakes are high when considering security, privacy, and savings,... Read More
When Great Plains Software was designing and developing Great Plains... Read More
ERP Consulting industry is on the way to serve clients... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Lotus Notes Domino is very efficient in electronic document workflow... Read More
Fundraising software lets you connect with donors in a way... Read More
We are in a transition phase in the Managerial Administration... Read More
Viruses and spyware usually show up on your computer one... Read More
high-end home cleaning Winnetka ..Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More
Microsoft Business Solutions Navision is main ERP application for European,... Read More
And kill the best layout software in the process of... Read More
So, why should you use any O/R mapping tool? I... Read More
If you look back to the history, you will see... Read More
Need help making sense of algebra? Have algebra lectures in... Read More
Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More
DBxtra goes ASPGetting to the information hidden within corporate databases... Read More
There are certain pluses and minuses in both cases and... Read More
Some introduction into Great Plains Software products, now Microsoft Business... Read More
Microsoft Business Solutions Great Plains has Project Accounting module where... Read More
Should one use Windows Update?This topic has good and valid... Read More
The term "document management" and "paperless office" is the subject... Read More
Homeland security, airport security, Internet security ??" these days we???re... Read More
Research bears that less than 70 percent of development projects... Read More
Most computer users use spreadsheets software such as Microsoft Excel... Read More
RSS (Really Simple Syndication) is a way for a site... Read More
There are many commands that are used in linux on... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
Microsoft Business Solutions Great Plains is very good fit for... Read More
With thousands of web pages added to the Net every... Read More
Microsoft Great Plains is becoming more and more popular and... Read More
For a windows user like me, just can watch with... Read More
This tutorial covers OLAP solutions used by Data warehouses and... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
Software |