Description

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.

Key Features

Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.

Readership

Everyday Computer Users.

Table of Contents

Acknowledgments

Authors

Technical Editor

Foreword

Chapter 1: Why Spy?

Introduction to Spying

Pray for Peace, Prepare for War

Ethics of Spying

Spying on Spouses

Spying on Your Children

When You Should Not Spy

Real-World Case Study

Summary

Chapter 2: Spying Basics

Introduction

Goals of Spying

Psychology of Spying

Spying Methodology

Using Overt Monitoring as a Deterrent

Using Covert Spying to Observe Behavior

Demonstration

Case Study: Dangers of Misinterpretation and Distrust

Summary

Chapter 3: Technology Overview: Computer Basics

Introduction

Hardware

Software

Summary

Chapter 4: Network Basics

Introduction

Network Basics

IP Address

Network Traffic

Summary

Chapter 5: Taking Control

Introduction

Cover Your Tracks

Basic Skills

Software You Will Use

Mastering Your Domain

Summary

Chapter 6: Spying on the PC

Introduction

Mission 1: Collect the Basics

Mission 2: Examining the Past

Mission 3: Live for the Present

Mission 4: Prepare for the Future

Mission 5: Look for Hidden Information

Case Study: Expand Your Investigation Beyond the Local Computer

Summary

Chapter 7: Spying on Web Browsing

Introduction

What Is Web Browsing?

What Can You Get from Web Browsing?

Typical Web Browsers

Basic Skills

Collecting Information from Your Target’s Computer

Collecting Information about Your Target from the Network

Summary

Chapter 8: Spying on E-mail

Introduction

Overview of E-mail

Popular E-mail Clients

Web Mail

Collecting E-mail

Case Study: Return to Sender

Summary

Details

No. of pages:
400
Language:
English
Copyright:
© 2005
Published:
Imprint:
Syngress
Print ISBN:
9781931836418
Electronic ISBN:
9780080488653

About the authors

Eric Cole

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.

Affiliations and Expertise

Independant network security consultant and speaker, USA

Sandra Ring

Affiliations and Expertise

Deputy Directory for Research at the TSGI Advanced Technology Research Center, USA