Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
![]() |
|
![]() |
|
![]() |
|
![]() |
Spyware is like the new technological nuclear weapon on the... Read More
What is a Web Database?A web database is a database... Read More
Now is the time to look at an alternative to... Read More
The java programming language is becoming more and more popular... Read More
Lotus Notes Domino is very efficient in electronic document workflow... Read More
Ok... Where to start?Well, I guess I will start at... Read More
Considering whether or not your software company should hire a... Read More
If you feel intimidated when someone tries to teach you... Read More
Stealing company information used to be the specialty of spies... Read More
.Net Framework is a platform or development environment to seamlessly... Read More
I completed an experiment recently. I wanted to find out... Read More
Microsoft CRM has built-in conversion tool, however you should probably... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
There are plenty of articles out there about how to... Read More
In our small article we'll consider Microsoft Business Solutions Great... Read More
Most people don't use Photoshop to its fullest capabilities. Here... Read More
Words we choose to describe things and phenomena often show... Read More
We were recently faced with a decision: either to let... Read More
Microsoft Business Solutions offers several ERP applications: Great Plains, Navision,... Read More
Navision Software was purchased by Microsoft and now it is... Read More
Crystal Reports is the most flexible tool on the market... Read More
Did you ever give a thought to the number of... Read More
Microsoft Business Solutions ? Navision is an integrated solution for... Read More
Usually, the easiest way to tell you have spyware is... Read More
Microsoft Business Solutions is emerging as very attractive vendor for... Read More
During the years of our consulting practice, which comes back... Read More
Sometimes your PC will start acting strange for no apparent... Read More
While I was preparing some personal background information for a... Read More
Assertion facility is added in J2SE 1.4. In order to... Read More
Simply put, fleet maintenance allows companies to monitor and maintain... Read More
CD and DVD replication is a process that works by... Read More
With many manufacturing shops heading over seas in favor of... Read More
Currently Microsoft Business Solutions is on the way of creating... Read More
Microsoft Business Solutions Great Plains might be considered as ERP... Read More
1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More
Customer Relationship Management or CRM is a combination of enterprise... Read More
And kill the best layout software in the process of... Read More
Microsoft Business Solutions CRM data conversion deserves FAQ type of... Read More
1. With mapping software you can create a report that... Read More
Microsoft Great Plains, Navision, Solomon and Axapta are Microsoft Business... Read More
When my daughter was getting into AOL instant messaging (AIM)... Read More
Customer Relationship Management, abbreviated "CRM," is the term for a... Read More
The first thing that you will notice about Linux Red... Read More
Finding the best spyware removers to detect and remove spyware... Read More
This article is the first of a series of articles... Read More
Document Management or Enterprise Information Management is perhaps one of... Read More
Microsoft Business Solutions Great Plains has substantial market share and... Read More
While I was in college, if you would have asked... Read More
When you visit department stores and see that majority of... Read More
The most important benefit of XML is its simplicity. Though... Read More
This article is for advanced Microsoft CRM SDK C# developers.... Read More
While several preventive maintenance software manufacturers offer free trials for... Read More
Do you remember that frustrating feeling when you find an... Read More
Passwords protect your most sensitive personal, financial and business information.... Read More
Spyware is like the new technological nuclear weapon on the... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
The purpose of Project Management Software is to provide an... Read More
This tutorial covers OLAP solutions used by Data warehouses and... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
Make-or-Break Factors in Success and ProfitabilityFor quick printers, estimating can... Read More
Sales are all about leverage, because there is only so... Read More
In the Clinton era the status quo was simple: you... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
We've all seen the ads on TV for Netzero 3G.... Read More
Microsoft Business Solutions Small Business Manager is Great Plains Dexterity... Read More
In the new era of internet marketing the problem of... Read More
Software |