Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
limo prices to midway Crystal Lake west of Randal .. Lockport Chicago limo O’HareMicrosoft Business Solutions Great Plains was historically designed to serve... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
An operating system (abbreviated OS) is essentially the path through... Read More
Enabling Chinese input is quick and easy, there are only... Read More
Almost all new and major brand of PCs come with... Read More
In the real world a "fire wall" is a fireproof... Read More
Finally, you have some time to personalize your desktop with... Read More
Many reasons made GBM a unanimous choice for experts, one... Read More
If you have been using the Internet for any amount... Read More
Following tips help you to learn a software in lesser... Read More
Remember old good days when your company probably had Great... Read More
Microsoft Great Plains is main Microsoft Business Solutions accounting package... Read More
Several software companies design programs for preventive maintenance. Most of... Read More
What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More
We were recently faced with a decision: either to let... Read More
Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More
Some companies that are in need of fleet management may... Read More
I love new technology. I am still ready to wait... Read More
Microsoft Business Solutions Great Plains is very generic accounting application... Read More
Upgrading. Downtime. Maintenance. Hardware obsolescence. Implementation issues. The litany of... Read More
IntroductionDuring the early years of our modern computer era, very... Read More
Microsoft Business Solutions CRM proved to be reliable solution in... Read More
Running Applications in Compatibility Mode With Windows XP, you can... Read More
While I was in college, if you would have asked... Read More
taxi o'hare Auburn ..Document Manager and Version HistoryIn previous articles I have discussed... Read More
Cyberspace has opened up a new frontier with exciting possibilities... Read More
Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More
Using professional icons in your application or website can bring... Read More
The cornerstone of successful automated office systems is the ability... Read More
One day, you suddenly realize that your computer started to... Read More
This article is the first of a series of articles... Read More
If you are in the market for new staffing software,... Read More
Microsoft Business Solutions Great Plains is mid and even corporate... Read More
Since its release in 1987, QuarkXpress had made an immediate... Read More
As you probably know, when Microsoft purchased Great Plains Software... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
Microsoft Great Plains is one of three Microsoft Business Solutions... Read More
Corporate ERP/MRP selection might be tough one, especially considering very... Read More
Introduction To ISDN, Part III: Configuring PPP PAP AuthenticationNow we... Read More
Anyone who has ever used Microsoft Word knows that it... Read More
How many steps does it take you to locate and... Read More
Writing software manuals is boring, isn't it? We often think:... Read More
Healthcare facilities such as clinics, hospitals, and biomedical laboratories can... Read More
In this small article we will show you the possible... Read More
Shareware is software that you can try before you buy;... Read More
Beginning with Domino version R4 it has integration with the... Read More
Not every software testing project can or should be automated.... Read More
One of the things we can be as certain of... Read More
Microsoft Outlook is one of the most widely used software... Read More
Software |