There are different levels of Spying. For example, Alexa, popular software owned by Amazon.com, would be called a “BackDoor Santa” it doesn’t actually log your keystrokes or take system snapshots but it does record some surfing activity. However, programs like Spector are very skilled at stealthily gathering information including passwords, surfing history, and even chat logs and e-mails. If you haven’t done so already take a moment to read the Introduction to Spyware and Malware located here.
Who is Spying your System? How to monitor your system and check for the signs of spy softwares.
1) Work Environment: Assume you are being monitored. Most workplaces have the right to do this so by default get used to the fact that someone is monitoring you. There are several ways employers can monitor employees. Some use activity logging software to see what programs are being accessed and for how long. Naturally many will use spy software programs also known as “snoop ware” or a key-logger to take snapshots and log all keystrokes. An employer may actually monitor internet traffic as it moves across an intranet.
2) Anti-Spy Programs: A popular way to find out if someone is spying on you. Anti-Spy programs look for signatures or traces that are specific to certain spy software. Some simply do text string scanning to find them, and others i.e. (X-Cleaner from Xblock) actually extract and attempt to remove the Spyware. Be careful of the ones that use only text string scanning. Text string scanning can give false positives and in some cases it actually it can accidentally target anti-spy software! You can try a free online scanner.
Anti-Spy software can be a double-edged sword! Many spies will actually buy anti-spy software to scan and check to make sure their Spyware is not being detected. There is a hidden arms race that rages between Spyware vendors and anti-spy companies.
3) System Resources: Poorly written spy software will almost always put a drag on system resources. Watch out for poor system resources, running out of memory, lots of hard disk activity or a screen that “flickers”. This is caused by some spy software programs as they take snapshots of the computer screen that requires system resources.
4) Machine Access: Watch for people trying to gain access to your machine. Many software programs that are designed for spying require physical access to the target machine.
5) Installation Monitors: Currently on the market are software programs that will log every installation that occurs on your machine. It is best to leave these hidden on the system. It is possible to catch the installation of many spies in this way.
6) Anti-Virus: Many anti-virus programs can catch prolific spy software because they are often classified as “Trojan Horses”. Keep spy software up to date and make sure it is running in the background. This might not protect you against from some spy software but it will let you know if any re purposed Trojan horses are installed. Keep in mind that Trojans like NetBus or DeepBO are also classified as spy software because they open up a system to outside connections. Don’t be lulled into a false sense of security because you have one installed. They are helpful but there is no such thing as 100% fool proof protection.
7) Personal Firewall: In today’s treacherous Internet it is very helpful to also run a personal firewall. Firewalls will alert you to both inbound and outbound activity. You can control what is allowed in and out of your system. Watch for suspicious programs you do not recognize trying to send data out of your system.
8) Downloading Smarts: Simply put use common sense when downloading and avoid sources you cannot trust. If you are someone who frequents “warez” or crack sites you will more than likely encounter a Trojan or virus.
9) Common Sense: Be careful about what you install on your system. Don’t run e-mail attachments and read the EULA (end user license agreement). Keep an up to date anti-spy package on your machine.
10) Spy Software: Ironically you can monitor for spy software by installing spy software on your system first! Since spy software can record all keystrokes it can monitor and record the installation of another spy software. Again this turns into a virtual arms race, but keep in mind that many spy programs are vulnerable to anti-spy attacks.
Related: Secure Computer
Windows Computer Software Mobiles Tips Virus Trojan Manual Removal Informations
No comments :
Post a Comment
Comment on this Post!!