How To Be Your Own Secret Service Agency

So you want to know who your kids are chatting with. Or if your spouse has a blossoming e-mail romance. Or if one of your employees is leaking confidential information on the side. These tools will allow you to find out the truth and get the evidence you can present to court.

Spytech SpyAgent
http://www.deprice.com/spytechspyagent.htm

Spytech SpyAgent is a powerful and easy-to-use software utility that allows you to log all keystrokes typed and applications launched. All logs are easily viewed with the built in log viewers and can be saved to a convenient, easily viewed text format.

SpyAgent can be run on Windows startup in active monitoring mode with an optional splash warning screen. This allows you to have the option to let others using your workstation that they are being monitored (or not). A built in stealth mode is available to keep users from task-ending or knowing about SpyAgent. SpyAgent gives you the power to log all websites visited, windows viewed, applications ran, internet connections made, passwords entered, documents printed, AIM/AOL/ICQ/Yahoo/MSN conversations made, documents opened, emails sent/received, and even capture screenshots of the user's activities.

iSpyNow
http://www.deprice.com/ispynow2.htm

SpyNOW is the critically acclaimed, award winning remotely deployable computer monitoring software used by hundreds of thousands of people across the globe. Make no mistake about it, iSpyNOW is first of its kind. iSpyNOW offers it's users the ability to remotely monitor a machine via a web interface, without ever having physical access to the PC! Unlike competing products, iSpyNOW offers a totally seamless online-based control panel system, backed by intuitive wizards and powerful log viewing capabilities - no external client modules are necessary to download.

IamBigBrother
http://www.deprice.com/iambigbrotherspy.htm

Do you need to view the captured activity from work or another computer at home?IamBigBrother records all of the internet activity for many programs including America Online, MSN, Outlook Express and more. And it logs all keystrokes typed in EVERY program along with screen shots. So basically IamBigBrother monitors EVERYTHING on your computer.

ActMon Home Edition
http://www.deprice.com/actmonhome.htm

The Home Edition records EVERYTHING (including Web sites, Chat, Email and AOL). It is the best choice for parents who wish to monitor what their children are doing online. It is an excellent alternative to standard filtering and blocking software. To avoid tampering of the software, it features a unique file protection that makes the ActMon files truly invisible to every user and every windows software.

SpyBuddy
http://www.deprice.com/spybuddy.htm

SpyBuddy comes equipped with the functionality to record all e-mail's sent and received, all AOL/ICQ/MSN/AIM/Yahoo/Trillian chat conversations (including MSN Messenger 6.0 and up), all web sites visited, all windows opened and interacted with, every application executed, every document printed, every file or folder renamed and/or modified, all text and images sent to the clipboard, every keystroke pressed, every password typed, and more.

SpyMyPC Pro
http://www.deprice.com/spymypcpro.htm

SpyMyPC PRO is a highly flexible, all-round desktop security monitoring solution written for the Windows operating system. SpyMyPC PRO allows you to secretly record ALL keystrokes typed on your PC without the user ever knowing! SpyMyPC PRO also includes advanced stealth mode features to prevent users and/or programs from detecting and disabling it, an e-mail delivery feature for remote monitoring, and much more.

John Deprice has tested a variety of internet/chat monitors, spying software and keyloggers. For results, visit http://www.deprice.com/utilities.htm

In The News:


Forbes

Building A Strong Foundation: How Network Architecture Dictates IT Security
Forbes
Although IT security has emerged as a high-profile, headline-grabbing issue, the concept of securing data has traditionally been secondary at best. Developers are typically focused on other elements, such as design and functionality. As a result ...

and more »

NPR

Equifax Confirms Another 'Security Incident'
NPR
After the revelation that a cybersecurity breach at the international credit reporting agency Equifax exposed personal information of 143 million people, the company has confirmed an additional security incident with a payroll-related service in the ...
Equifax says it had a security breach earlier in the yearABC News
Equifax acknowledges a second security 'incident' happened in MarchCNBC
Equifax Execs Resign; Security Head, Mauldin, Was Music MajorNBCNews.com
TechCrunch -CNNMoney -Bloomberg -Bloomberg
all 1,836 news articles »

USA TODAY

The Early Edition: September 21, 2017
Just Security
The U.N. Security Council backed reforms to its peacekeeping missions yesterday, Vice President Mike Pence stating that the U.N. must be more efficient and effective. Alexandra Olson reports at the AP. U.N. Secretary General António Guterres opened the ...
At UN, Trump's 'me first' doctrine abandons Truman's postwar 'security for all'USA TODAY
Remarks by President Trump at the Reforming the United Nations: Management, Security, and Development MeetingThe White House (blog)

all 4,361 news articles »

Forbes

Alphabet's Nest Goes After The Boring (But Big) Home Security System Market
Forbes
Alphabet-owned Nest has launched a full-on assault on the home security services market. At a press conference in San Francisco Wednesday morning, the smart gadget company announced its first full-fledged security system, Nest Secure. Nest Secure's ...
Nest's home security system costs $499 and comes with magnetic ...The Verge
Nest launches a new $349 smart outdoor security cameraTechCrunch
Alphabet's Nest introduces new home security devices as CEO promises big increase in salesCNBC
Phys.Org -Gizmodo -Business Insider -Nest
all 116 news articles »

Tunisia must live up to promises to end impunity for security forces at UN Human Rights Council
Amnesty International
The use of torture in custody and human rights violations committed in the name of security and counterterrorism will continue unabated unless Tunisia lives up to the commitments it has made today at the UN Human Rights Council in Geneva, said Amnesty ...

and more »

Engadget

Knightscope's new security bot looks like a mini concept car
Engadget
Robot maker Knightscope has been in the news lately for all the wrong reasons. Its K5 security robot took a look at the harsh world and chose to throw itself into a fountain. And a different K5 robot was attacked and knocked over by a drunk guy. But ...

and more »

PBS NewsHour

White House refutes Erdogan's claim that Trump apologized for charges against security guards
PBS NewsHour
The White House on Wednesday refuted Turkish President Recep Tayyip Erdogan's claim that President Donald Trump apologized to him after the Department of Justice filed charges against members of Erdogan's security detail following a clash outside of ...
Turkish president: Trump apologized for indictment of security staff in brawlThe Guardian

all 221 news articles »

Washington Post

UC system will chip in at least $300000 to help Berkeley pay security costs for controversial speakers
Los Angeles Times
The University of California will chip in at least $300,000 to help UC Berkeley pay security costs for controversial speakers, an unprecedented step as criticism mounts over the financial toll the events are taking on the campus. “Free speech is not ...
UC President to Pay Half of Security Costs for Shapiro, YiannopoulosInside Higher Ed
'Substantial cost': University of California foots major security bill for free speechWashington Post

all 36 news articles »

National Review

For National Security!
National Review
Call it Cooke's Rule: Those losing the argument over a given domestic policy will eventually cry “necessity.” This morning, Matthew Olsen and Benjamin Hass provide a good example, arguing in Politico that “the Electoral College is a national security ...

and more »

10TV

Security robots used to help fight crime
10TV
The security bots use the same technology used at TSA security checkpoints to determine the size and shape of weapons. Creators are also working on audio detection to help security locate the scene of a crime. “The opposite of voice recognition, can ...

Google News

Web and Computer Security

Well, if that would have been said to me by... Read More

Delete Cookies: New-Age Diet or Common Sense Internet Security?

No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

How to Get Rid of New Sobig.F Virus?

As you know, this time the virus under the name... Read More

How Free Scripts Can Create Security Problems

With the Internet entering our lives in such an explosive... Read More

Free Ways to Tackle Threats to Your Computer

Protect Your PCHaving problems with your pc? Do your kids,... Read More

Social Engineering: You Have Been A Victim

Monday morning, 6am; the electric rooster is telling you it's... Read More

Can I Guess Your Password?

We all know that it's dangerous to use the same... Read More

Just Whos Computer is this Anyway?

Well, this is an article I never thought I would... Read More

Is Shopping Online For Your Horse Gifts Safe?

Shopping for horse gifts or other gift items on the... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers

I am the victim of an internet scam. It is... Read More

Top Ten Spyware and Adware Threats Identified

On December 8, 2004 Webroot, an award winning anti-spyware solution... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Secure Your PC From Hackers, Viruses, and Trojans

Viruses, Trojans and Spyware: Protecting yourself.No user on the internet... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Protecting Your Home Both Inside and Out

If you are a parent, you have probably wondered at... Read More

Viruses and Worms, Protection from Disaster

Virus damage estimated at $55 billion in 2003. "SINGAPORE -... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

How Can Someone Get Private Information From My Computer?

From the "Ask Booster" column in the June 17, 2005... Read More

If You Sell Anything Online Your ePockets Are Being Picked

You and I are a lot alike. We are both... Read More

Pharming - Another New Scam

Pharming is one of the latest online scams and rapidly... Read More

3 Steps to Ending Scams and Virus Problems

Watching how the traditional media covers the latest virus or... Read More