Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
In the early days of the personal computer, we're talking... Read More
It would be easy to think, like most people apparently... Read More
Finally, you have some time to personalize your desktop with... Read More
In this short FAQ style article we would like to... Read More
Traditionally we were considering functionally rich systems, such as SAP,... Read More
Microsoft released Service Pack 2 (SP2) for the Windows XP... Read More
Considering whether or not your software company should hire a... Read More
Microsoft Business Solutions Great Plains is marketed for mid-size companies... Read More
Vince Lombardi once said that, "The achievements of an organization... Read More
Once a business idea is selected, it is highly recommended... Read More
We all take the computer for granted. I mean, all... Read More
Executive SummaryAn effective plan for entering, cleaning and updating the... Read More
The intuitive algorithm.Roger Penrose considered it impossible. Thinking could never... Read More
Shareware has been fighting the stigma of being misunderstood for... Read More
The research in the field of Natural Language Processing usually... Read More
Microsoft Great Plains could be tuned and setup to fit... Read More
Microsoft Business Solutions Great Plains is Dexterity-written application and currently... Read More
Does Microsoft care for WebmastersIt's always been a problem with... Read More
Looks like Microsoft Great Plains becomes more and more... Read More
Do you remember that frustrating feeling when you find an... Read More
When making a decision to buy any piece of software... Read More
When Great Plains Software introduced the first graphical accounting application... Read More
Today's business world is fast-paced. No matter what it is... Read More
Microsoft Business Solutions ? Great Plains has captured the US... Read More
Crystal Reports is the most flexible tool on the market... Read More
Each Industry and market niche has business specific and unique... Read More
Spyware is software or hardware installed on a computer without... Read More
The destruction of the Soviet Union about 15 years ago,... Read More
Bad News - the Threat is Bigger than it SeemedHow... Read More
This is intermediate level SQL scripting article for DB Administrator,... Read More
It's no secret that software companies operate in a very... Read More
Document Management or Enterprise Information Management is perhaps one of... Read More
We all already got used to computer monitoring both at... Read More
How many steps does it take you to locate and... Read More
Before September of 1995, Microsoft ignored the Internet because their... Read More
I like my software simple. If it's too complex or... Read More
Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More
Midsize business or non-profit organization should decide if one-vendor solution... Read More
This article is the third of a series of articles... Read More
Microsoft Great Plains is becoming more and more popular and... Read More
Microsoft-Outlook is a pretty amazing program. So much more than... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software eEnterprise,... Read More
How do you run a program on a remote server... Read More
Hi, Guys,I believe a lot of programmers are trying to... Read More
Task Manager is a Windows system utility that displays thetasks... Read More
If you would like to pick something from Microsoft, or... Read More
In 2004 Oracle, Inc. made its new step toward J2EE... Read More
Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More
Creating a new markup language.Introduction.General Reuse Markup Langauge, or GRML,... Read More
Linux essentials:It's free for download but you have to pay... Read More
ERP is the acronym of Enterprise Resource Planning. Multi-module ERP... Read More
Great Plains Fixed Assets Management module is a robust tool... Read More
In the real world a "fire wall" is a fireproof... Read More
Microsoft Great Plains is main mid-market application from Microsoft Business... Read More
When you double-click a layer in the Layer Palette, you... Read More
Does Microsoft Have any Real Competition? Copyright (c) 2003 Gregory... Read More
The java programming language is becoming more and more popular... Read More
We would like to give you pluses and minuses of... Read More
When it comes to running an office, the SOHO entrepreneur... Read More
No matter how much you enjoy your favorite screensavers, sometimes... Read More
With many manufacturing shops heading over seas in favor of... Read More
Considering whether or not your software company should hire a... Read More
When you own a small business, time is money. And... Read More
The intentions of this short tutorial are not to teach... Read More
While I was preparing some personal background information for a... Read More
If you have Great Plains Dynamics/eEnterprise (version 6.0 or earlier)... Read More
Software |