Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
Remember old good days when your company probably had Great... Read More
SOFTWARE PIRACY We regularly hear reports... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
Microsoft Business Solutions Great Plains is very popular ERP platform... Read More
Are you one of those people that keeps track of... Read More
The intentions of this short tutorial are not to teach... Read More
You've finally created databases that you can actually use to... Read More
Microsoft Business Solutions Great Plains is very good fit for... Read More
Although statistics often is blamed for various deadly sins --... Read More
There are certain pluses and minuses in both cases and... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
The COSMIC FP (function point) software quality metric, is no... Read More
Words we choose to describe things and phenomena often show... Read More
Microsoft Business Solutions Great Plains has full-featured manufacturing set of... Read More
Sticky Noteshttp://www.deprice.com/stickynote.htmWith StickyNote 9.0, you can create beautiful 3D notes... Read More
Cyberspace has opened up a new frontier with exciting possibilities... Read More
Microsoft Business Solutions ? Great Plains has captured the US... Read More
Many Webmasters have never bothered to view their website's server... Read More
Stealing company information used to be the specialty of spies... Read More
We'll give you non formal view, based on our consulting... Read More
Each Industry and market niche has business specific and unique... Read More
Microsoft CRM is relatively new player on the now becoming... Read More
Microsoft Business Solutions Great Plains has many years of successful... Read More
Is your PC is slow and wimpy? Then you need... Read More
Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More
Have you noticed WordPerfect is gearing up for a comeback... Read More
Domino server is a buffer between the operation system and... Read More
In our opinion, traditional approach when you select ERP/MRP system... Read More
Microsoft Great Plains is now targeting large and midsize businesses... Read More
Once a business idea is selected, it is highly recommended... Read More
Looks like Microsoft Great Plains becomes more and more... Read More
Now that spyware is the single most dangerous threat to... Read More
DBxtra goes ASPGetting to the information hidden within corporate databases... Read More
Around the same time Microsoft made its move with .Net... Read More
Microsoft Great Plains is main Microsoft Business Solutions accounting package... Read More
When you first think about multicurrency ? you probably have... Read More
It is really interesting that a bug can create problem... Read More
We all take the computer for granted. I mean, all... Read More
Task Manager is a Windows system utility that displays thetasks... Read More
Microsoft Business Solutions Great Plains has full-featured manufacturing set of... Read More
Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More
All of us know that Microsoft bought former Great Plains... Read More
Ok... Where to start?Well, I guess I will start at... Read More
Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More
First we had the original Google search that evolved into... Read More
Let's first look at your ERP system selection (without Retail... Read More
Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More
Software development is a risky business.Many software developers are barely... Read More
Introduction: The creating of a computer program involves a number... Read More
Fundraising software lets you connect with donors in a way... Read More
Software |