Words we choose to describe things and phenomena often show our attitude towards what we say. They imperceptibly reflect our opinions and judgments, prejudices and preferences, moral convictions and beliefs. Whether we like it or not, good deal of words we use are biased, or should I say "slanted", --positively or negatively. Two people will call the same thing differently, depending on their points of view.
Look at this example: "Monitoring", "surveillance", "control", "data interception", "gathering evidence of wrongdoing" -- on the one hand; "sleuthing", "spying", "eavesdropping", "snooping", "peeping", "prying", "tapping"--on the other. A neutral "information gathering device" vs. negatively loaded "bug"--choice of words clearly shows whether we approve or disapprove it.
If you feel you have right to do so, you are "monitoring my kids' online behavior"; your resentful kids, however, might think you are to poking your nose into their lives. The same at work--but here it is you who is the person under surveillance, and your opinion might differ from the CEO's, who probably thinks that "workplace surveillance software improves employees' performance and prevents violations of security policy and corporate code of conduct" (or something similar).
Most of arguments on this issue start right here; the crucial point is whether those who perform monitoring are authorized to do so.
Computer monitoring and email monitoring have been in the limelight for several years, and public interest is not going to fade. The very issue of monitoring is extremely complicated. Here technical matters become directly connected with wide range of political, legal, economic and moral issues. The data interception technology has everything to do with a wide range of very serious matters--from identity theft to various aspects of national security.
The problem is that this technology is a double-edged sword. Software used for parental control or workplace surveillance often apply the same mechanisms as malicious programs used for data stealing and plain spying. But there are differences.
These two specific program functions are typical to spy programs:
First, preliminary configuration of the monitoring module (it is usually called "client" or "agent") is possible, with a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied ? until the consequences show up.
Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.
Last, but not least ? spyware is always used illicitly and behind the user's back ? here monitoring is performed by a person who has no right for it. Unlike spyware, legally used monitoring programs are seldom used furtively. Though in many states it is officially permitted not to let employees know about monitoring, companies--especially large ones--rarely make a secret out of it.
Remove these two functions - and you will get a monitoring program instead of spy software. If it is impossible to pre-configure the monitoring module and install it remotely; if you should have administrator privilege to install the program, it is monitoring software, not spyware.
As we can see, monitoring products in themselves are neither good nor bad. Compare them with a knife--one may use it both for cutting cheese and for stabbing a neighbor to death. Tool is only a tool, but be careful--this one is of a dangerous kind.
Alexandra Gamanenko currently works at Raytown Corporation, LLC--an independent monitoring and anti-monitoring software developing company. Its products are based on innovative technologies the company's R&D department developed. Learn more--visit the company's website http://www.softsecurity.com/
![]() |
|
![]() |
|
![]() |
|
![]() |
If you look back to the history, you will see... Read More
There is many things more frustrating than surfing a website... Read More
Which Type of Shop Can Rely On A Home Built... Read More
The title of "software engineer" has got to be among... Read More
Let's first look at your ERP system selection (without Retail... Read More
The Internet is reshaping every form of communications medium, and... Read More
Research bears that less than 70 percent of development projects... Read More
Just the thought of a duel-boot scares many people away,... Read More
XML Server can be a Web Server that stores the... Read More
Formatting and reinstalling windows 98 is very easy if you... Read More
Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More
In today's business world it's all but impossible to escape... Read More
Since Version 8.0 Microsoft Business Solutions Great Plains & Great... Read More
.Net Framework is a platform or development environment to seamlessly... Read More
Although we don't know whether Microsoft ever envisioned such a... Read More
"Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More
Homeland security, airport security, Internet security â?" these days weâ??re... Read More
Is Photoshop CS2 worth the upgrade? You bet it is!... Read More
What is Groupware?Have you ever had to manage document collaboration... Read More
eStore Advantage allows front-office applications to communicate with back-office business... Read More
Microsoft Business Solutions CRM is present several years on the... Read More
Have you noticed WordPerfect is gearing up for a comeback... Read More
Microsoft Great Plains serves the wide spectrum of horizontal markets.... Read More
The Windows Indexing Service provides you with the ability to... Read More
Collaboration SoftwareCollaboration Software, also known as group collaboration software or... Read More
Learning how to program software seems like a daunting task... Read More
In order to implement VLANs in a network environment, you'll... Read More
Microsoft Business Solutions ? Great Plains is designed to meet... Read More
One of the things we can be as certain of... Read More
Viruses and spyware usually show up on your computer one... Read More
Sales are all about leverage, because there is only so... Read More
All of us know that Microsoft bought former Great Plains... Read More
You have gotten those E_Mails buy software at deep discounts.... Read More
Think of this, first we had the HAM Radio, then... Read More
There are two approaches for application integration:? Programmer's approach ?... Read More
Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More
When my daughter was getting into AOL instant messaging (AIM)... Read More
Great Plains Purchase Order Processing (POP) module makes up one-third... Read More
If you have Microsoft Great Plains and support it for... Read More
Microsoft Great Plains fits to majority of industries, in the... Read More
Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More
Microsoft bought Navision, Denmark based software development company, along with... Read More
And kill the best layout software in the process of... Read More
New post-recession era has new features, which didn't exist in... Read More
It won't matter how effective your WinRunner Team is if... Read More
Microsoft Client Relation Management system (Microsoft CRM) and Microsoft RMS... Read More
If you have been running Windows XP for a couple... Read More
While I was preparing some personal background information for a... Read More
Spyware is software or hardware installed on a computer without... Read More
Microsoft Great Plains might be considered as ERP platform to... Read More
Introduction: The creating of a computer program involves a number... Read More
Do you want to get quality software at a reasonable... Read More
The software giants don't do everything and don't always produce... Read More
You might think you don't need a firewall... Read More
Professional services firm cuts costs and improves productivity with integrated... Read More
Are you a database professional? Do you work with a... Read More
To all web designers out there, this article is for... Read More
(1) Avoid using the same variable again and again for... Read More
When you double-click a layer in the Layer Palette, you... Read More
Looks like Microsoft Great Plains becomes more and more... Read More
Microsoft CRM is CRM application, maintained and supported by Microsoft... Read More
First we had the original Google search that evolved into... Read More
Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More
I suggest that you do not spend a lot of... Read More
TCO (Total Cost Ownership) is the buzzword in... Read More
When you need a phone number, you do a quick... Read More
Software |