Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Monitoring Software Can be Used for Spying as Well > NetSparsh - Viral Content you Love & Share

Monitoring Software Can be Used for Spying as Well

We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance.

These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to.

But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware?

Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC.

The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto.

Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it.

If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy.

First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up.

Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.

Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC).

Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card.

Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise.

Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information".

No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat.

Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

Forbes

Why Does The Software Industry Build Bloatware?
Forbes
This 'story' is not about me, or my devices, or the software applications (apps) that I use. This story concerns the apps that I don't use, but that I do own, as do you. We all carry around machines with software applications that ship pre-installed on ...


Audi's electric SUV delayed over software bug
Seeking Alpha
Audi's (OTCPK:AUDVF) first electric SUV will hit showrooms four weeks later than planned because the carmaker needs new regulatory clearance for a piece of software that was modified during the development process. Audi staged a global launch of the ...


TechCrunch

Early-stage SaaS VC slip snaps recovery as public software stocks soar
TechCrunch
A few months ago, Crunchbase News reported that a longstanding period of SaaS investment stagnation had come to an end. However, the investment boom times didn't necessarily carry over to the seed and early-stage end of the subscription software ...


Business Insider

Audi's electric SUV faces four-week delay because of software bug
Business Insider
FRANKFURT/SEOUL (Reuters) - Audi's first electric sport utility vehicle (SUV) will hit showrooms four weeks later than planned because of a software development issue, a spokesman for the German luxury car brand said on Sunday. The spokesman said ...
Audi's E-tron SUV will be delayed due to regulatory approval over a software updateThe Verge

all 11 news articles »

The Verge

Google is using software to make the Pixel 3's screen corners even rounder
The Verge
Material Theme, an updated version of the company's software design philosophy, is the driving force behind the Gmail and Chrome redesigns of late, and you'll notice it most prevalently in the new Chrome tab design that eschews rough and pronounced ...
Google makes Pixel 3 display corners rounder with softwareMobileSyrup
Google Pixel 3 software makes display corners rounder in the name ...Phone Arena
Verizon's Pixel 3 won't work on other carriers unless activated on Verizon firstThe Verge

all 83 news articles »

Pinterest's Evan Sharp on the Future of Software
WIRED
Over the next few weeks we'll be publishing these taped conversations as a part of the podcast. In this interview, Mike and Arielle ask Sharp what it's like to receive praise from Ive, how machine learning is changing software design, and whether ...


Motley Fool

Check Point Software Will Be Checking In With Investors Next Week
Motley Fool
Check Point Software Technologies (NASDAQ:CHKP) is dawdling even as the broader cybersecurity market is growing at a solid pace. The cybersecurity specialist has been more concerned with share buybacks and growing its bottom line, even as rivals are ...
Check Point Software Technologies (CHKP) Research Coverage Started at WedbushFairfield Current

all 77 news articles »

Will Tech Leave Detroit in the Dust?
Wall Street Journal
Software expertise is also a weakness, Mr. Betts said, because auto makers have long depended on their suppliers to write code rather than building that talent internally. Auto makers point out that they have one advantage that newcomers to the ...

and more »

Coupa Software Acquires Aquiire For Supplier Catalog Search
Seeking Alpha
Coupa has acquired Aquiire for an undisclosed amount. Aquiire has developed a highly regarded B2B eProcurement system. For COUP, the deal should bolster its Business Spend Management platform and provide customers with cost-reduction capabilities ...

and more »

TechCrunch

Buggy software in popular connected storage drives can let hackers read private data
TechCrunch
Security researchers have found flaws in four popular connected storage drives that they say could let hackers access a user's private and sensitive data. The researchers Paulos Yibelo and Daniel Eshetu said the software running on three of the devices ...

Google News

Great Plains Accounting Migration to Microsoft Great Plains - Overview for IT Specialist

This is a short article, written in question/answer/FAQ style to... Read More

Rapid Application Development - Is it Really a Need of Today?

Rapid Application Development (RAD) is a software development methodology. In... Read More

Google Brings the Earth to Your Desktop

Google Inc. has launched a new software package that allows... Read More

Microsoft Great Plains: Getting New Users Licenses ? Annual Service Plan FAQ

Microsoft Business Solutions Great Plains, Solomon, Navision, Axapta, Microsoft CRM... Read More

Microsoft CRM Conversation Gateway: VoIP - Implementation & Customization

Microsoft CRM is winning market share step-by-step from such the... Read More

Things You Can Do With Windows XP!

Did you ever give a thought to the number of... Read More

Instant Messaging is a Sweet Way to Communicate

MSN messenger is a pretty cool invention. I mean I'm... Read More

CRM and Customer Life Cycle

Customer Relationship Management or CRM is a combination of enterprise... Read More

Make 2005 the Year You Save Time!

Today's business world is fast-paced. No matter what it is... Read More

Microsoft CRM and Great Plains Implementation: Freight Forwarding Business Automation Example

Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More

Microsoft Great Plains: Annual Enhancement Program ? How To Be Re-Enrolled

Microsoft Business Solutions Great Plains is mid and even corporate... Read More

Chinese Input - Step by Step Instruction on How to Input Chinese Characters in English Windows XP

Enabling Chinese input is quick and easy, there are only... Read More

Microsoft RMS Customization ? PO Items Receiving in Great Plains

Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More

Microsoft Great Plains: Customization Upgrade & Recovery ? Visual Studio VB 6.0

Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More

Microsoft Great Plains Installation ? Overview for IT Director/Controller

Microsoft Great Plains is main mid-market application from Microsoft Business... Read More

RSS: Get Notified When Your Favorite Websites Are Updated

RSS (Really Simple Syndication) is a way for a site... Read More

Enterprise Resource Planning Overview

ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More

Guide to Software Marketing

Intro This concise article will tell you in plain English... Read More

How to Tell You Have Spyware, Ad-ware or Viruses

Usually, the easiest way to tell you have spyware is... Read More

Instant Messenger Clients

If you have been using the Internet for any amount... Read More

Is Your Computer Sick?

Viruses and spyware usually show up on your computer one... Read More

SQL: Querying Microsoft Great Plains ? Overview for Database Administrator/Developer

Looks like Microsoft Great Plains becomes more... Read More

DVD Burning Tips

CD and DVD replication is a process that works by... Read More

You Can Write Microsoft Office Program in About 60 Minutes

Microsoft Office program is a programming tool called Visual Basic... Read More

Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant

All of us know that Microsoft bought former Great Plains... Read More