We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance.
These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to.
But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware?
Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC.
The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto.
Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it.
If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy.
First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC).
Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card.
Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise.
Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information".
No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat.
Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill.
Learn more -- visit the company's website http://www.anti-keyloggers.com
limousine Ackley .. Lockport Chicago limo O’HareMicrosoft Great Plains is one of three Microsoft Business Solutions... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
COMMAND LINE FUNCTIONA powerful command line script processor has been... Read More
Are you lost in the mess of documents that get... Read More
SyncUp, a file synchronizer is designed to assist the home... Read More
When you think... Read More
Just stress testing one of the latest Linux distributions. Been... Read More
Microsoft Business Solutions Great Plains has I'd say end user... Read More
Each Industry and market niche has business specific and unique... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More
In this small article we will show you the possible... Read More
Microsoft Business Solutions Great Plains has substantial market share among... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
It won't matter how effective your WinRunner Team is if... Read More
This article will not attempt to advocate the use of... Read More
As of now - Great Plains Dynamics/eEnterprise is transformed/renamed into... Read More
It is really interesting that a bug can create problem... Read More
Anti-virus software is used to find, remove or fix files... Read More
Microsoft Great Plains and Microsoft CRM become more and more... Read More
If you use Microsoft Outlook (or similar applications) for e-mailing,... Read More
When my daughter was getting into AOL instant messaging (AIM)... Read More
What is Software?Software is a set of instruction written to... Read More
Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More
1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More
Professional services firm cuts costs and improves productivity with integrated... Read More
shuttle from O'Hare Alexander ..In order to meet regulatory and corporate compliance requirements reporting... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
The Microsoft system preparation utility for Windows 2000 is a... Read More
In the case when you represent mid-size or mid-size-to-large business,... Read More
Today's business world is fast-paced. No matter what it is... Read More
Microsoft Great Plains serves majority of US based horizontal and... Read More
Bar charts, bar graphs, and any other chart or graph... Read More
There are two major WYSIWYG(What You See Is What You... Read More
If you have Microsoft Great Plains and support it for... Read More
GroupwareThe internet is full of 1.5 million to 7 million... Read More
Learning how to program software seems like a daunting task... Read More
Trying to figure out a stream in banning one email... Read More
Microsoft CRM is CRM application, maintained and supported by Microsoft... Read More
Disclaimer: All the thoughts expressed are my views only! Your... Read More
The vast majority of us will have, at some point,... Read More
Sticky Noteshttp://www.deprice.com/stickynote.htmWith StickyNote 9.0, you can create beautiful 3D notes... Read More
This article will not attempt to advocate the use of... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
Hey Guys! Don't raise your eyebrows or fear by hearing... Read More
Microsoft Business Solutions ? Great Plains is designed to meet... Read More
Linux essentials:It's free for download but you have to pay... Read More
In linux, one of great commands for finding out information... Read More
If you are in a business that passes documents around... Read More
Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More
Introduction to C++Why Learn C++?C++ may at first seem like... Read More
Software |