Maintain your old Siemens Hipath system

S is for Spying, Surveillance -- and for Software as Well

Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.

Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.

If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).

Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.

Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.

The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.

These two specific program functions are typical to spy programs:

First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.

Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.

Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.

Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.

As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.

Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/

In The News:

Tear gas fired as police and protesters clash in Hong Kong
Sun, 21 Jul 2019 15:37:00 +0100
Police in Hong Kong have fired tear gas to disperse pro-democracy protesters - hours after a largely peaceful rally against a now-suspended extradition bill.

Police tell criminals to take the weekend off as stifling heat grips US
Sun, 21 Jul 2019 17:37:00 +0100
Police in the US have told criminals to take the weekend off as a sweltering heatwave causes disruption across the East Coast.

Several injured as car collides with crowds at cemetery
Sun, 21 Jul 2019 17:28:00 +0100
Several people have been injured - one of them seriously - after a car drove into crowds at a cemetery in Dundalk, Co Louth.

'Alter your course': Audio of moment Iranians warn UK-flagged tanker
Sun, 21 Jul 2019 07:06:00 +0100
New audio has been released of the Iranian Revolutionary Guard and the Royal Navy both giving instructions to a UK-flagged tanker before it was "illegally" seized by Tehran.

Woman 'decapitates mother' as four-year-old boy looks on
Sun, 21 Jul 2019 07:30:00 +0100
A woman has been charged with murder after allegedly decapitating her mother as a four-year-old relative looked on.



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

Microsoft Business Solutions Products Selection: ERP, CRM, Retail Management

Let's first look at your ERP system selection (without Retail... Read More

The Software 2005 Conference - A Review

The Software 2005 conference is now a wrap. This conference,... Read More

Microsoft Great Plains Implementation: Verticals - Wholesale Order Entry center ? overview

Microsoft Business Solutions Great Plains has substantial market share and... Read More

Microsoft CRM Implementation for Large Corporation ? overview

Microsoft Business Solutions CRM is now approaching the phase of... Read More

Implementing ERP for Large Publicly Traded Corporation ? Microsoft Great Plains

We would like first emphasize the change in the paradigm.... Read More

Top Questions to Ask Before Buying a Help Desk & Asset Management Software

#5 All your hardware components like Printers, PCs etc come... Read More

Microsoft CRM Customization ? Programming Closed Email Activity

Microsoft CRM is CRM answer from Microsoft and attempt to... Read More

Microsoft CRM: Implementation, Customization, Support ? Consultant Overview

Microsoft Business Solutions CRM is present several years on the... Read More

Interactive Mapping Brings Information to Life

What is Interactive Mapping?Interactive mapping is a visual display medium... Read More

Corporate ERP Selection: Microsoft Great Plains

In our opinion, traditional approach when you select ERP/MRP system... Read More

Inherent Dangers Of File Sharing Via The Internet.

Cyberspace has opened up a new frontier with exciting possibilities... Read More

Make 2005 the Year You Save Time!

Today's business world is fast-paced. No matter what it is... Read More

How to Tell You Have Spyware, Ad-ware or Viruses

Usually, the easiest way to tell you have spyware is... Read More

Linux vs Windows Operating Systems

With so many Microsoft Windows related viruses, errors, and other... Read More

Great Plains Customization Upgrade? Overview For CIO/IT Director

Around the same time Microsoft made its move with .Net... Read More

ERP System of the Future: Database, Business Logic and Interface

We will base our prognosis on our Microsoft Business Solutions... Read More

Cisco Certification: Introduction To ISDN, Part IV

In part III of this ISDN primer, we learned that... Read More

Daffodil DB: Web Database

What is a Web Database?A web database is a database... Read More

Theres Gold in Your Websites Server Log

Many Webmasters have never bothered to view their website's server... Read More

Call Alert Notifications - Free Answering Machine Software for PCs

If you're online using a dialup Internet connection, you'll probably... Read More

Microsoft Great Plains: Manufacturing or Bill of Materials - Overview for IT Specialist

Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More

CRM and Customer Life Cycle

Customer Relationship Management or CRM is a combination of enterprise... Read More

Dont Choose Adobe When Working With PDF

While Adobe is the most known maker of PDF tools,... Read More

How To Avoid Getting Hooked By Pfishing

"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More

Microsoft Great Plains eCommerce ? Stored Procedures Approach

Since Version 8.0 Microsoft Business Solutions Great Plains & Great... Read More