Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives Review
Posted by
Pearlene McKinley
on 12/06/2012
/
Labels:
crime drama,
encryption,
fatal encryption,
hacking,
hacks
Average Reviews:
(More customer reviews)This is not a book about security and defending yourself from spying but the basics of why one might consider spying on other members of their family. Whether because they suspect infidelity, criminal activity or some other concern there are a lot of reasons why people might want to find out what others are doing on their computer. A very important point made in the beginning of the book is the question of the ethics of spying including the effect it has on the trust of a relationship. The authors also point out that sometimes spying is much less of an ethical consideration. Sometimes it might be part of protecting your children from online predators or other real dangers.
The book covers the basics of spying including creating a plan, getting the right software or hardware to implement the plan and actual implementation. The authors do a good job of pointing out how we leave tracks behind and how to get rid of those tracks as well as how to exploit them.
Written for the novice user it starts at the very beginning with things like how to open the command prompt and running explorer. From there it goes on to look at more basic as well as intermediate level techniques. The authors even include information on some rather advanced software such as ethereal (one of my personal favorites). It does give you a solid understanding of what the different software is capable of doing but really doesn't provide a thorough treatment of any of them. In the case of Ethereal and Snort both have complete books written about how to use them effectively so obviously part of a chapter barely scratches the surface of what can be done.
For the most part it teaches the easier ways of finding out information without using difficult advanced tools. It includes how to access areas where passwords, usernames, etc. are stored as well as directories and files that do not show up in explorer unless you know how to hand-enter the path to them.
Whether you are spying on someone's web browsing, e-mail, internet chat, or instant messaging the basics are all here. They even include information on how to remove evidence of your activities and ways to tell if you are being watched.
These techniques are mainly for local network spying and not for use over the Internet. Although still subject to many ethical and other considerations, for the purpose of finding out what is going on within your local network Cyber Spying is highly recommended.
Click Here to see more reviews about: Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
0 comments:
Post a Comment