Board logo

subject: The Reason Behind Using Activity Monitors, And Keyloggers [print this page]


There are just a few things that a monitoring program on the computer can mean. First, somebody might be spying on you using a keylogging program. Second, parents are using it to monitor their kid's computer conduct, or third, a company may be using it for their workers to make sure they are being productive. Either way, monitoring computer programs offer many advantages and disadvantages.

If you want to monitor what a person is doing on a particular computer, use a keylogger. A keylogger will record every keystroke that a typist makes on the computer on which it is installed. All information typed can be logged, including log ins, bank information, passwords, and other personal and private information Often the person using the computer is completely unaware that the software is even installed. In most cases the software is installed by a bad link or other type of malicious method. There have been several reports of stolen information by an installed keystroke logger.

Keyloggers are used with remote linking capabilities as well as provide the hacker access to the typed information by a distant computer connection. It is recognized that many cyber-terrorist infect the actual victim's computer system with malware as well as Trojans without the user actually being aware since the facts are secretly sent.

While many don't agree about the ethics of the practice, it has legitimate uses too. This particular software might allow a parent to record keystrokes to monitor the sites that their children go to. Nevertheless, there are other methods for moms and dads to monitor their own kid's web usage.

Another form of computer monitoring is an activity monitor, which many consider more ethical. Some of the things that activity monitors do is record visited websites, applications used, emails sent, programs started, and anything that has been downloaded.

These types of monitors permit parents to covertly observe what kids are doing on the web. The actual files are stored and protected in a pre-designated area. When the monitoring software program is running, it works without anyone's knowledge that the program is being utilized. There are no open task bars, windows, or symbols to expose the program. To see the activity, a parent might have the document delivered to their e-mail inbox. Other monitoring programs keep an eye on businesses by remote and LAN connections and work just like the activity monitors and keyloggers.

by: William Josephs




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0