This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services.
*Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level.
*Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.
Everyday Computer Users.
Chapter 1: Why Spy?
Introduction to Spying
Pray for Peace, Prepare for War
Ethics of Spying
Spying on Spouses
Spying on Your Children
When You Should Not Spy
Real-World Case Study
Chapter 2: Spying Basics
Goals of Spying
Psychology of Spying
Using Overt Monitoring as a Deterrent
Using Covert Spying to Observe Behavior
Case Study: Dangers of Misinterpretation and Distrust
Chapter 3: Technology Overview: Computer Basics
Chapter 4: Network Basics
Chapter 5: Taking Control
Cover Your Tracks
Software You Will Use
Mastering Your Domain
Chapter 6: Spying on the PC
Mission 1: Collect the Basics
Mission 2: Examining the Past
Mission 3: Live for the Present
Mission 4: Prepare for the Future
Mission 5: Look for Hidden Information
Case Study: Expand Your Investigation Beyond the Local Computer
Chapter 7: Spying on Web Browsing
What Is Web Browsing?
What Can You Get from Web Browsing?
Typical Web Browsers
Collecting Information from Your Target’s Computer
Collecting Information about Your Target from the Network
Chapter 8: Spying on E-mail
Overview of E-mail
Popular E-mail Clients
Case Study: Return to Sender
Chapter 9: Spying on Chat and Instant Messages
What Is Instant Messaging?
Types of Chat and Instant Messaging
Collecting Passwords and Buddy Lists
Collecting Chat and Instant Messages
Chapter 10: Advanced Techniques
Improving Your Skills
Expanding Your Horizons
Chapter 11: Counterspy: Are You Being Watched?
How to Be Sneaky
How to Tell If You Are Being Watched
How to React If You Are a Target
Identifying Who is Spying on You
A Note about Spyware
Case Study: Guilt is for Suckers, Not Spies
- No. of pages:
- © Syngress 2005
- 15th March 2005
- eBook ISBN:
- Paperback ISBN:
Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.
Independant network security consultant and speaker, USA
Deputy Directory for Research at the TSGI Advanced Technology Research Center, USA