Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
Batchtown Chicago prom limo .. Lockport Chicago limo O’HareIf you are software developer or database administrator - we... Read More
It's not very often I get excited about a software... Read More
Language development computer: Computer-based method for aiding language development seems... Read More
The first thing that you will notice about Linux Red... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
Most people don't use Photoshop to its fullest capabilities. Here... Read More
Enabling Chinese input is quick and easy, there are only... Read More
Microsoft Business Solutions Great Plains version 8.5, 8.0, 7.5, Great... Read More
Today's business world is fast-paced. No matter what it is... Read More
A few months back I really got sick of my... Read More
When Great Plains Software introduced the first graphical accounting application... Read More
Our hosted solution allow you to run your own search... Read More
Spyware and Adware infest over 90 percent of computers in... Read More
Let us give you - developer some hints in the... Read More
Microsoft Business Solutions Great Plains was purchased from Great Plains... Read More
Now that spyware is the single most dangerous threat to... Read More
Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More
If you have Microsoft Great Plains as main accounting and... Read More
It's all about turn times in the eMedia industry! The... Read More
Assertion facility is added in J2SE 1.4. In order to... Read More
Microsoft Business Solutions Great Plains is very good fit for... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
When it comes to screenplay software each screenwriter needs to... Read More
The most important things you can do for your computer... Read More
Microsoft CRM is CRM answer from Microsoft and attempt to... Read More
shuttle from Midway Munster are ..Looks like Microsoft Great Plains becomes more and more popular,... Read More
Microsoft Great Plains fits to majority of horizontals and retail... Read More
Assertion facility is added in J2SE 1.4. In order to... Read More
Adware is a type of Spyware program that displays some... Read More
While I was preparing some personal background information for a... Read More
Microsoft Business Solutions Great Plains fits to majority of horizontal... Read More
Case study: A secretary using Corel WordPerfect 7 is often... Read More
Microsoft Great Plains is becoming more and more popular and... Read More
Microsoft Business Solutions Great Plains has several options to enable... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Creating a new markup language.Introduction.General Reuse Markup Langauge, or GRML,... Read More
I suggest that you do not spend a lot of... Read More
Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More
Looks like Microsoft Great Plains becomes more and more popular,... Read More
Since technology changes so quickly, it is hard to begin... Read More
What is Spyware?Spyware monitors your surfing habits and sends the... Read More
The destruction of the Soviet Union about 15 years ago,... Read More
Innovative Maintenance Systems (IMS) is one company that offers solutions... Read More
Well, even if the combination might look very unusual, we... Read More
The title of "software engineer" has got to be among... Read More
Microsoft has never released a service pack for Windows98 SE,... Read More
When you double-click a layer in the Layer Palette, you... Read More
Corporate ERP/MRP selection might be tough one, especially considering very... Read More
Mike Dunville* had a decision to make. As the new... Read More
Have you noticed WordPerfect is gearing up for a comeback... Read More
Software |