Spy Software
Spy software, commonly referred to as "Spyware", is any software
application that was designed to secretly
collect information from a user. Some
Spyware applications have limited abilities,
but some pose a serious privacy concern.
Spyware is becoming more sophisticated in
today's digital age. Some of these
applications have the ability to be remotely
installed without the need of physical
access to your computer. Others have the
ability to monitor your chat transcripts,
email usage, and internet connection in a
complete stealth enviroment. There are many
other powerful features these spyware
applications offer. To name a few: Remote
Access, Critical System Information, Remote
Desktop Viewing, Webcam Capturing, Keystroke
Logging, Application Usage etc.
Another definition: spy software (snoopware, spyware, nonviral
malware, hackers utility, surveillance
utility, Trojans,…) is any hidden (stealth,
invisible) software program that aids in
unauthorized gathering different information
about a person or organization without their
knowledge. It records such information as
every keystroke, including system keys, all
AOL/ICQ/MSN/AIM chat conversations, all
websites visited, all windows opened and
interacted with, every application executed,
every document printed, all texts and images
sent to the clipboard etc. in a log file on
the PC hard disk or network disk or
transmission of captured data to a
pre-determined internet address (relay it to
other interested parties).
Keyloggers
A Keylogger is a software or hardware application that was designed
to capture all keystrokes typed. Software
keylogger utilities are used more often
simply by how they are distributed. Some
keyloggers are distributed commercially
while others can be obtained through warez
or hacker websites. Advanced Keyloggers have
the ability to run silently on a target
machine and remotely deliver the recorded
information to the user who initiated the
monitoring session. Usually Keylogger is the
basic part of anyone Espionage or Activity
Monitoring Software.
Keystroke monitoring software, as everything else, created by man,
can be used both for the welfare and to the
detriment of a computer user, company and
government organization. All confidential
information is passed through the keyboard
and reaches the PC. This includes all
passwords, usernames, identification data,
credit card details, and confidential
documents (as they are typed), etc. On the
one hand, keystroke monitoring programs are
an essential part of "trusted computing
base", and it allows to control
"unauthorized access to information". It is
a powerful management tool for companies,
which want to increase their productivity
and profitability. On the other hand,
keystroke monitoring program may be misused.
A Bad Boy can obtain confidential
information, such as credit card numbers or
access passwords by using these programs.
Some of monitoring products are freeware and
can be quickly downloaded and installed on
any computer, anywhere, at anytime, even by
users without credit cards!
Keystroke monitoring software may be distributed and installed
locally, i.e. through floppy disk, networks,
etc, or it may be distributed remotely.
Keystroke monitoring program may be
enveloped in a Trojan or virus, and be
distributed via email. More advanced
keystroke monitoring program will then email
the recorded key logs silently - the user
will never know it is there! For example -
the newest computer viruses send email
messages with infected attached files, as
well as install spying Trojan component to
steal information from infected systems.
Spy software is often purchased and used to protect children from
Internet predators, allow spouses to prevent
infidelity, and can also promote employee
productivity. Since the purpose of the
software is for good intentions, it's not
picked up by anti virus programs. However,
often people abuse spy programs and use them
for illegal activities, especially with
remote installation of spy software being
possible. If you want to assure your
computer activities are private, you need
anti spy software.
Trojan Horses
Trojans or often called backdoors are programs which will most be
sent via email, instant-messengers or
filesharing-tools. If you run a trojan file
it will install itself on your computer to
get run every time you boot up your machine.
Trojans opens a port (channel) on your
system which can be used by an attacker to
connect to your computer. Trojans can enable
almost everything for an attacker to do
harmful things like
viewing/modifying/deleting data, watching
you when you are working or surfing the web,
etc. Depending on the trojan there can be
thousands of functions built in which can be
remotely used by any attacker to spy you.
Remeber, that only specialized software like Keylogger Detector can
detect spy software. Our specialists know
ALL about spy software - that's why we offer
quality anti-spyware product.
|