• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 5. ONLINE DISCLOSURES AND THAT B... > So, You Always Wanted to Live in a S...

So, You Always Wanted to Live in a Spy Novel

If you are the one doing the investigating, perhaps looking at history files and sent e-mail aren't enough for you. A lot of products are available to monitor the use of your computer. Some are used by parents to keep an eye on their kids' activities on the Internet. Others are used by non-trusting spouses to watch their partners. Many of them can work without the knowledge of the person being watched. What's the easiest way to find these products? Use your favorite Internet search utility. We entered “PC monitoring surveillance” into Google (at www.google.com) and turned up the category “Computers; Security; Products and Tools; Keyloggers and Spyware” in the Open Directory. There were 30 products listed in late July 2001.

Of course, some of these products can be used by hackers as well as by non-trusting spouses. For current protection mechanisms against hackers—more current than can be in a printed book—consult the Web. We like the AdvICE section of the Network Ice Internet Security Systems Web page at http://advice.networkice.com/advice.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint