Monitoring Software Can be Used for Spying as Well

We all already got used to computer monitoring both at work and at home. We got used to advertising monitoring software products as tools for parental control and workplace surveillance.

These programs are indeed helpful tools -- to a certain extent. Large and middle-sized companies use legitimate monitoring programs for workplace surveillance -- to ensure information security and local network accountability. At home more and more parents install such software as a "life jacket" for their web-surfing kids. You probably use such a program already, or going to.

But are you aware that these so handy and absolutely legal monitoring programs installed on lots of PCs -- and perhaps on yours, too -- have a very dangerous sibling called keylogging spyware?

Keylogging spyware (such programs are usually called simply "keyloggers")has very much in common with legitimate monitoring software. These programs spy -- they log keystrokes and mouse clicks, make screenshots, compile a neat log-file and send it to the person who installed (as a rule, remotely) this program on your -- or somebody else's -- PC.

The very principle is often the same. Actually, the technology applied in monitoring software is a dual-purpose one. It is neither good nor bad -- numerous things can be used for several purposes, not all of them permissible. A knife is a typical example -- while we are cutting bread with a bread knife, somebody stabs his neighbor to death with a dagger or stiletto.

Identity thieves do know how to use both kinds of this software for their nefarious purpose. I am not going to talk about moral issues, but if there is an opportunity, there always will be one to use it.

If these programs are so closely related, how to tell which is which then? Well, there are two specific program functions that are typical only to programs that spy.

First, it is possible to carry out preliminary configuration of the monitoring module (it is usually called client, agent etc.), getting a compiled executable file as a result. This file, when installed, doesn't display any messages or create windows on the screen. It "hides itself" and "shows no signs of life". It is impossible to notice whether the particular PC is being secretly monitored or not. Of course, the user is not aware of being spied -- until the consequences show up.

Second, spy software always has built-in means of remote installation; as a rule, the pre-configured module (agent) is installed into the target PC remotely. Then the files with obtained information are sent via local network or emailed to the person who installed the spy program.

Remove these functions -- and you will get a monitoring program instead of spyware. If it is impossible to pre-configure the monitoring module and install it remotely, it is not spyware. If you should have administrator privilege to install the program, it is monitoring software. (Person with administrator privilege installs major software products, and in case of a home computer, it is usually the person who owns the PC).

Nevertheless, there are some vendors who advertise monitoring products with "remote deployment", i.e. function of remote installation. In fact, nothing distinguishes these programs from malicious keyloggers. Some of them are actually Trojan Horse programs, which can be sent by email disguised as, say, a greeting card.

Many users feel that it is impossible to install a surveillance program without physical access to their PCs. Unfortunately, they are mistaken. And security experts confirm-- remote deployment of surveillance software is sharply on the rise.

Researchers from Websense Security Labs in their "Security Trends Report" call such programs "commercial keyloggers" and caution users against them: " These commercial keyloggers may be marketed as products that allow you to spy on your spouse or watch your children's online activities. They are often used as packaged attacks designed to capture keystrokes to gather online banking passwords, login credentials, Social Security Numbers and other identity-related information".

No wonder that both security experts and vendors now see keyloggers -- no matter whether they are commercial ones or those cybercriminals write themselves -- as a grave threat.

Keyloggers can be also included into freeware and shareware. Trojan programs, viruses and Internet worms often contain keyloggers, too. Security experts warn that information-stealing programs are already relatively common and predict the further rise of unlawful use of such software. That is why it is so important to apply special anti-keylogging protection.

Alexandra Gamanenko currently works at Raytown Corporation, LLC -- an independent software developing company. The company's R&D department created an innovative technology, which disables the very processes of capturing information, such as keylogging, screenshoting, etc. The company's anti-keylogging software doesn't detect spy programs or information-stealing Trojans one by one -- it brings all the "spies" to a standstill.

Learn more -- visit the company's website http://www.anti-keyloggers.com

In The News:


pen paper and inkwell


cat break through


FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More

Is Your Family Protected?

When you think... Read More

Computer Based Language Development and Spell-checking

Language development computer: Computer-based method for aiding language development seems... Read More

Groupware: What Works the Way Businesses Do?

GroupwareThe internet is full of 1.5 million to 7 million... Read More

Protect Your Most Vital Business Asset with Security Software

Homeland security, airport security, Internet security â?" these days weâ??re... Read More

The Dreaded Paper Label - Should it be Used?

While paper labeling CDs and DVDs may appear to be... Read More

Microsoft CRM Customization Secrets ? Second Edition

This article is for advanced Microsoft CRM SDK C# developers.... Read More

The Hidden Power of Online Manual

Writing software manuals is boring, isn't it? We often think:... Read More

The Secret of the Layer Styles Dialogue

When you double-click a layer in the Layer Palette, you... Read More

How a Bug Challenges to a Software Professional

It is really interesting that a bug can create problem... Read More

Microsoft Great Plains 8.0 Brazilian Version ? Overview For International Consultant

Microsoft Great Plains has substantial mid-market share in the USA... Read More

What is Fleet Maintenance Software?

Simply put, fleet maintenance allows companies to monitor and maintain... Read More

Great Plains Accounting Migration to Microsoft Great Plains - Overview for IT Specialist

This is a short article, written in question/answer/FAQ style to... Read More

Groupware and Online Collaboration: Collaboration Series #4

This article is the fourth of a series of articles... Read More

A Guide To Purchasing Professional XP Icons Online And Enhancing Your Applications

Icons are used everywhere; right from software applications, to internet... Read More

Defining OLAP Solutions and Data Warehouse design

This tutorial covers OLAP solutions used by Data warehouses and... Read More

Microsoft Great Plains Installation ? Overview for IT Director/Controller

Microsoft Great Plains is main mid-market application from Microsoft Business... Read More

Great Plains Bill of Materials Setup & Customization for Process Manufacturing ? Overview

Microsoft Great Plains has full-featured Manufacturing suite of modules: Capacity... Read More

Kick-Ass Performance For Your PC? Its Easy

Is your PC is slow and wimpy? Then you need... Read More

Marketing Your WinRunner Team

It won't matter how effective your WinRunner Team is if... Read More

Microsoft CRM for Corporate Business ? Working Offline

If your company has regional and worldwide operations, you might... Read More

Microsoft Great Plains in Metal Distribution: Implementation & Customization ? Consultant Overview

Microsoft Business Solutions Great Plains serves to the wide spectrum... Read More

C++ Tutorial 2, Input and Variables

This is the tutorial where we really get into programming.... Read More

Microsoft Great Plains: Annual Enhancement Program ? How To Be Re-Enrolled

Microsoft Business Solutions Great Plains is mid and even corporate... Read More

Great Plains Customization Upgrade? Overview For CIO/IT Director

Around the same time Microsoft made its move with .Net... Read More

6 Easy Steps for a Smoother CD/DVD Order

It's all about turn times in the eMedia industry! The... Read More

OEComplete ? A Personal Information Manager

OEComplete is a utility for managing the personal information of... Read More

HSphere Control Panel Tips and Tricks - Power At Your Fingertips: Part 1

The first topic we are going to discuss... Read More

Monitoring Software Can be Used for Spying as Well

We all already got used to computer monitoring both at... Read More

Huddle Up; Groupware on Three

It could just be me, but my experiences with document... Read More

OS 101: Suggestions for Choosing an Operating System

An operating system (abbreviated OS) is essentially the path through... Read More

10 Ways to Learn a Software

Following tips help you to learn a software in lesser... Read More

Run Your Own Search Engine

Our hosted solution allow you to run your own search... Read More