Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
Mokena prom limo .. Lockport Chicago limo O’HareMicrosoft Great Plains, Navision, Solomon and Axapta are Microsoft Business... Read More
Crystal Reports is the most flexible tool on the market... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
GroupwareThe internet is full of 1.5 million to 7 million... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
Lotus Domino/Notes ? Microsoft Great Plains tandem as ERP with... Read More
Microsoft Business Solutions Small Business Manager is Great Plains Dexterity... Read More
The cornerstone of successful automated office systems is the ability... Read More
There are many commands that are used in linux on... Read More
If you copy something from a Web site or elsewhere...... Read More
The most important things you can do for your computer... Read More
Great Plains Fixed Assets Management module is a robust tool... Read More
Professional services firm cuts costs and improves productivity with integrated... Read More
IBM Lotus Domino or Microsoft Exchange?The severe competition continues for... Read More
The java programming language is becoming more and more popular... Read More
Do you remember that frustrating feeling when you find an... Read More
If you have been using the Internet for any amount... Read More
Whether you are a small consultancy firm, a medium sized... Read More
XML Server can be a Web Server that stores the... Read More
Java has come along a long way. Many would agree... Read More
Words we choose to describe things and phenomena often show... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
It is possible that if one avoided all sources of... Read More
Mokena Chicago limo O'Hare ..There is many things more frustrating than surfing a website... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
Around the same time Microsoft made its move with .Net... Read More
Most people understand that the "hardware" part of their computer... Read More
2005 ? Back to the Future.What does the future hold?... Read More
Words we choose to describe things and phenomena often show... Read More
Using professional icons in your application or website can bring... Read More
In our case ? we serve Microsoft Business Solutions ERP... Read More
In part III of this ISDN primer, we learned that... Read More
It is possible that if one avoided all sources of... Read More
Fortunately one of the most common reasons cited for the... Read More
Document Manager and Version HistoryIn previous articles I have discussed... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
In the case when you represent mid-size or mid-size-to-large business,... Read More
Microsoft Business Solutions Great Plains has full-featured manufacturing set of... Read More
Pirated software is on the increase and now accounts for... Read More
Sales are all about leverage, because there is only so... Read More
Although statistics often is blamed for various deadly sins --... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
Microsoft Great Plains may be recommended for international freight forwarding... Read More
Domino server is a buffer between the operation system and... Read More
If you are to buy a HelpDesk & Asset Management... Read More
Microsoft Great Plains ? ERM from Microsoft Business Solutions and... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
While Adobe is the most known maker of PDF tools,... Read More
Software |