We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance.
These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to.
But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware?
Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC.
The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto.
Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it.
If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy.
First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC).
Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card.
Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise.
Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information".
No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat.
Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection.
Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill.
Learn more -- visit the company's website http://www.anti-keyloggers.com
Each Industry and market niche has business specific and unique... Read More
Microsoft Business Solutions is emerging as very attractive vendor for... Read More
I started using PIP (Picture It Publishing) Platinum 2002 right... Read More
Designing without tables by using CSS layouts is fast becoming... Read More
Microsoft Business Solutions Small Business Manager is scaled down Great... Read More
Microsoft Business Solutions Great Plains, Solomon, Navision, Axapta, Microsoft CRM... Read More
While several preventive maintenance software manufacturers offer free trials for... Read More
The major reason I recommend getting your hands on real... Read More
Internet worms. Is your PC infected?If your computer has become... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
If you are software developer or database administrator - we... Read More
So, you've bought a new Macintosh, and now you may... Read More
MS CRM is very close to document workflow automation, including... Read More
Have you noticed WordPerfect is gearing up for a comeback... Read More
Domino server is a buffer between the operation system and... Read More
ERP (Enterprise Resource Planning) Overview covers What is ERP, Brief... Read More
I've been active in the Cisco Certification track for four... Read More
At the end of XX century, in the late 1990th... Read More
Is Photoshop CS2 worth the upgrade? You bet it is!... Read More
If there still are few unprotected computers left, I haven't... Read More
It would be easy to think, like most people apparently... Read More
How to delete the user? This is the first problem... Read More
Microsoft CRM is now on the scene and it is... Read More
What is Software?Software is a set of instruction written to... Read More
I provide, here clear explanations and a count of function... Read More
Microsoft SQL Server is the leader for inexpensive and middle... Read More
Accounts payable is just one area of office management where... Read More
Pirated software is on the increase and now accounts for... Read More
The first topic we are going to discuss... Read More
With any good luck and a good amount of hard... Read More
If you are in a business that passes documents around... Read More
Security flaws have long plagued Internet Explorer (IE), the market-dominating... Read More
Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More
The adware and spyware definitions list is very long. But... Read More
First we had the original Google search that evolved into... Read More
The title of "software engineer" has got to be among... Read More
What is IRC?IRC is Internet Relay Chat. It is a... Read More
You might think you don't need a firewall... Read More
The Windows registry is a huge database that ensures normal... Read More
In part III of this ISDN primer, we learned that... Read More
Microsoft Business Solutions Great Plains has several options to enable... Read More
#5 All your hardware components like Printers, PCs etc come... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
All of us know that Microsoft bought former Great Plains... Read More
When Windows fails to boot it is normally caused by... Read More
Customer Relationship Management or CRM is a combination of enterprise... Read More
Adobe Photoshop is one of the world's leading graphics editing... Read More
People often ask me: What image file formats will Photoshop... Read More
Domino server is a buffer between the operation system and... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
Microsoft Business Solutions Great Plains and MS CRM (client relation... Read More
Microsoft Retail Management System serves retail single store as well... Read More
With this small article we are continuing Microsoft Business Solutions... Read More
For those who are unclear on the differences between the... Read More
We are in a transition phase in the Managerial Administration... Read More
The US House of Representatives has recently passed the "Spy... Read More
Configuring PPP PAP AuthenticationNow we know how the ISDN link... Read More
Microsoft CRM is CRM answer from Microsoft and attempt to... Read More
Rapid Application Development (RAD) is a software development methodology. In... Read More
Enabling Chinese input is quick and easy, there are only... Read More
I have always had a tendency to focus on the... Read More
Since its release in 1987, QuarkXpress had made an immediate... Read More
Microsoft Great Plains is one of three Microsoft Business Solutions... Read More
There are certain pluses and minuses in both cases and... Read More
Best Software Act! is very popular CRM for small and... Read More
Software |