- Shopping Bag ( 0 items )
This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. Targets a wide audience: personal computer users, specifically those interested in the online activities of their families
Posted July 2, 2005
I¿ll be honest, this is kind of a weird book, but it¿s also fascinating to read and a must-have if you¿re serious about spying on a family member¿s internet activities. If you struggle with the ethics of spying, then don¿t even bother picking up this book. If you¿re past that and just want to find out what someone is doing online, or if you want a better understanding of what it takes to spy, then you¿re in for a treat. After a brief introduction chapter, and even an ethics discussion, the book dives headfirst into the subject. You can really spy on someone through two different methods: 1) Login to their computer and see what they¿re doing or 2) Get onto their network and sniff their traffic. Both types of spying require different types of skills. Both types of skills are covered in some depth in this book. Logging onto the victim¿s computer (usually a spouse) can usually be done. What is hard is covering your tracks. This book discusses ways to hide what you do, what to look for, how to spy on email, IM conversations, browser history, etc. There is also a very good discussion on keystroke capture devices and software. My favorite part of the book was under the ¿Advanced Techniques¿ section, where the author shows how to perform an ARP spoofing attack. This is a type of attack where you can trick a switch into sending packets to you (from the person you¿re spying on) that you normally wouldn¿t see. Deciding to spy on someone¿s internet activities is a pretty serious decision. If you¿re serious about doing it, and doing it right, then you must read this book. If you¿re not into spying on others, but want to know ways you could be spyed on, then you¿ll want to read this book too. It will open your eyes.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.
Posted April 1, 2005
With all the continuing publicity in the general media about nefarious activities on the Internet, and the possibility of crackers tunnelling into your computers, the average person might be bewildered at what to believe. This book tries to provide a rational and non-sensationalistic basis for protecting your home computers. Plus, and perhaps more to the point, to safeguard you and your family from online predation. There is necessary but mundane background on the basics of computer hardware and software and networking. But the book quickly moves into numerous spying methods. For surveilling a PC, browser, email, IRC and Instant Messages. Basically, for all the common modes of usage of a computer. The authors show that there are some disturbingly powerful programs and hardware devices floating around out there, available to anyone. Like the Best Free Keylogger, which is available from sourceforge, no less. Scarcely a suss website, eh? BFK captures keystrokes and screen captures, and can periodically email this data to any address on the Internet. A bloke could have some fun with this. A utility of the book is simply alerting you to the existence of programs like this, even if you never avail yourself of it. Which leads into the last section of the book - countermeasures to various methods described earlier in the text. Parse it carefully.Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.