Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
Willow Springs limo O'Hare .. Lockport Chicago limo O’HareWriting software manuals is boring, isn't it? We often think:... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More
How to delete the user? This is the first problem... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
The destruction of the Soviet Union about 15 years ago,... Read More
The first thing that you will notice about Linux Red... Read More
Now that spyware is the single most dangerous threat to... Read More
Microsoft Business Solutions Great Plains has Project Accounting module where... Read More
I suggest that you do not spend a lot of... Read More
Siebel is traditional CRM market leader, however and mostly due... Read More
Trying to figure out a stream in banning one email... Read More
The software giants don't do everything and don't always produce... Read More
So, you've bought a new Macintosh, and now you may... Read More
Costs of fleet maintenance software can vary widely. It is... Read More
Remember back in the days where screensavers were the coolest... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
Microsoft Business Solutions Great Plains fits to majority of horizontal... Read More
Every organization which creates collaborative documents, whether they are budgets,... Read More
The intentions of this short tutorial are not to teach... Read More
We would like first emphasize the change in the paradigm.... Read More
Microsoft CRM is CRM application, maintained and supported by Microsoft... Read More
It would be easy to think, like most people apparently... Read More
If you use Microsoft Outlook (or similar applications) for e-mailing,... Read More
Microsoft Business Solutions Great Plains might be considered as ERP... Read More
Microsoft Great Plains, former Great Plains Software Dynamics, eEnterprise has... Read More
group transportation logistics management Highland ..Small can be beautiful! Working with Knoppix for the past... Read More
The purpose of one of our projects was MS Exchange... Read More
.Net Framework is a platform or development environment to seamlessly... Read More
There are so many different programs that clutter up your... Read More
Microsoft Great Plains has full-featured Manufacturing suite of modules: Capacity... Read More
Is Photoshop CS2 worth the upgrade? You bet it is!... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
When you double-click a layer in the Layer Palette, you... Read More
If you would like to pick something from Microsoft, or... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
I have always had a tendency to focus on the... Read More
Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
Adware is a type of Spyware program that displays some... Read More
Microsoft CRM customization techniques are very diversified and based on... Read More
What is Interactive Mapping?Interactive mapping is a visual display medium... Read More
Looks like Microsoft Great Plains becomes more... Read More
It's all about turn times in the eMedia industry! The... Read More
ERP Consulting industry is on the way to serve clients... Read More
Microsoft CRM has built-in conversion tool, however you should probably... Read More
Microsoft Business Solutions Great Plains has many years of successful... Read More
All your software is stored on a hard-drive. But how... Read More
Once a business idea is selected, it is highly recommended... Read More
An integral part of any quality CRM system is lead... Read More
The Windows registry is a huge database that ensures normal... Read More
Software |