We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance.
These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to.
But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware?
Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC.
The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto.
Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it.
If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy.
First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC).
Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card.
Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise.
Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information".
No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat.
Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill.
Learn more -- visit the company's website http://www.anti-keyloggers.com
![]() |
|
![]() |
|
![]() |
|
![]() |
You turn on your computer, and it doesn't look quite... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
Music downloads are off the charts! We're listening to digital... Read More
The purpose of Project Management Software is to provide an... Read More
Once a business idea is selected, it is highly recommended... Read More
The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More
Microsoft Great Plains could be tuned and setup to fit... Read More
The Windows Indexing Service provides you with the ability to... Read More
When reading an article where some term is used often,... Read More
Remember nice and prosperous Clinton era? When you implemented innovative... Read More
In our case ? we serve Microsoft Business Solutions ERP... Read More
Are you a database professional? Do you work with a... Read More
RSS (Really Simple Syndication) is a way for a site... Read More
If your company has regional and worldwide operations, you might... Read More
Microsoft Business Solutions Great Plains was designed back in the... Read More
Stealing company information used to be the specialty of spies... Read More
Simply put, fleet maintenance allows companies to monitor and maintain... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
What is Snort?Snort is an open source network intrusion detection... Read More
Microsoft Retail Management (RMS) and Microsoft Great Plains are retail... Read More
Microsoft Business Solutions ? Great Plains has captured the US... Read More
Just the thought of a duel-boot scares many people away,... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
Microsoft Great Plains is one of three Microsoft Business Solutions... Read More
Microsoft Office program is a programming tool called Visual Basic... Read More
When you need a phone number, you do a quick... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
When Great Plains Software introduced the first graphical accounting application... Read More
The java programming language is becoming more and more popular... Read More
We are in a transition phase in the Managerial Administration... Read More
If you are software developer or database administrator - we... Read More
Google Inc. has launched a new software package that allows... Read More
There are two approaches for application integration:? Programmer's approach ?... Read More
The stakes are high when considering security, privacy, and savings,... Read More
C/SIDE (Client/Server Integrated Development Environment) - The core of... Read More
Need help making sense of algebra? Have algebra lectures in... Read More
Microsoft CRM is winning market share step-by-step from such the... Read More
All your software is stored on a hard-drive. But how... Read More
This short paper will expand on two key reasons to... Read More
What is 'adware'?Adware is basically software or scripts that are... Read More
Microsoft Business Solutions Great Plains as new ERP for multinational... Read More
Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More
Customer Relationship Management, abbreviated "CRM," is the term for a... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
Microsoft Business Solutions Great Plains is very generic accounting application... Read More
There are several kinds of software piracy. The bottom line... Read More
Background: For many organizations like ours, the interim target of... Read More
Trying to figure out a stream in banning one email... Read More
C++ Function templates are those functions which can handle different... Read More
With so many Microsoft Windows related viruses, errors, and other... Read More
Microsoft Great Plains is becoming more and more popular and... Read More
It could just be me, but my experiences with document... Read More
Heard about the Quark "killer"?Adobe InDesign CS2. Will it really... Read More
Great Plains Inventory Management (IV) module gives your business a... Read More
A UNIX Shell is in simplest terms, a command line... Read More
SAP Inc., a global leader in client/server enterprise application software... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
When you own a small business, time is money. And... Read More
The intentions of this short tutorial are not to teach... Read More
Formatting and reinstalling windows 98 is very easy if you... Read More
Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More
IBM Lotus Notes with Domino email server is traditional document... Read More
Document Management or Enterprise Information Management is perhaps one of... Read More
How many steps does it take you to locate and... Read More
The Microsoft system preparation utility for Windows 2000 is a... Read More
Using professional icons in your application or website can bring... Read More
Software |