Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
shuttle to Midway Beardstown .. Lockport Chicago limo O’HareIn our small article we'll consider Microsoft Business Solutions Great... Read More
We all already got used to computer monitoring both at... Read More
Microsoft Great Plains is now standard mid-market ERP application, serving... Read More
When it comes to screenplay software each screenwriter needs to... Read More
And kill the best layout software in the process of... Read More
When Windows fails to boot it is normally caused by... Read More
MSN messenger is a pretty cool invention. I mean I'm... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
I've been active in the Cisco Certification track for four... Read More
If someone entered your home, uninvited and installed numerous cameras... Read More
At the end of XX century, in the late 1990th... Read More
Bill of Lading is required report for Logistics and Freight... Read More
In the real world a "fire wall" is a fireproof... Read More
In this short FAQ style article we would like to... Read More
Microsoft Business Solutions CRM is now approaching the phase of... Read More
I started using PIP (Picture It Publishing) Platinum 2002 right... Read More
The Software 2005 conference is now a wrap. This conference,... Read More
Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More
We would like first emphasize the change in the paradigm.... Read More
The Windows Indexing Service provides you with the ability to... Read More
What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More
People often ask me: What image file formats will Photoshop... Read More
This short paper will expand on two key reasons to... Read More
There is many things more frustrating than surfing a website... Read More
ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More
Green Bay Hummer H2 SUV rentals ..The vast majority of us will have, at some point,... Read More
Microsoft Business Solutions Great Plains has full-featured manufacturing set of... Read More
Microsoft Business Solutions Great Plains serves multiple industries in the... Read More
For a windows user like me, just can watch with... Read More
The Windows Indexing Service provides you with the ability to... Read More
Enabling Chinese input is quick and easy, there are only... Read More
In this short FAQ style article we would like to... Read More
Fundraising software lets you connect with donors in a way... Read More
It could just be me, but my experiences with document... Read More
It is now common thing when large corporation selects mid-market... Read More
Music downloads are off the charts! We're listening to digital... Read More
The purpose of one of our projects was MS Exchange... Read More
Handling character strings in Java is supported through two final... Read More
One day, you suddenly realize that your computer started to... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
It is possible that if one avoided all sources of... Read More
All of us know that Microsoft bought former Great Plains... Read More
Accounts payable is just one area of office management where... Read More
Are you a database professional? Do you work with a... Read More
One of the main reasons business owners and entrepreneurs use... Read More
Writing software manuals is boring, isn't it? We often think:... Read More
If you have Microsoft Great Plains and support it for... Read More
When it comes to screenplay software each screenwriter needs to... Read More
Not every software testing project can or should be automated.... Read More
Software |