This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.

Key Features

Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services. *Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level. *Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.


Everyday Computer Users.

Table of Contents

  • Acknowledgments
  • Authors
  • Technical Editor
  • Foreword
  • Chapter 1: Why Spy?
    • Introduction to Spying
    • Pray for Peace, Prepare for War
    • Ethics of Spying
    • Spying on Spouses
    • Spying on Your Children
    • When You Should Not Spy
    • Real-World Case Study
    • Summary
  • Chapter 2: Spying Basics
    • Introduction
    • Goals of Spying
    • Psychology of Spying
    • Spying Methodology
    • Using Overt Monitoring as a Deterrent
    • Using Covert Spying to Observe Behavior
    • Demonstration
    • Case Study: Dangers of Misinterpretation and Distrust
    • Summary
  • Chapter 3: Technology Overview: Computer Basics
    • Introduction
    • Hardware
    • Software
    • Summary
  • Chapter 4: Network Basics
    • Introduction
    • Network Basics
    • IP Address
    • Network Traffic
    • Summary
  • Chapter 5: Taking Control
    • Introduction
    • Cover Your Tracks
    • Basic Skills
    • Software You Will Use
    • Mastering Your Domain
    • Summary
  • Chapter 6: Spying on the PC
    • Introduction
    • Mission 1: Collect the Basics
    • Mission 2: Examining the Past
    • Mission 3: Live for the Present
    • Mission 4: Prepare for the Future
    • Mission 5: Look for Hidden Information
    • Case Study: Expand Your Investigation Beyond the Local Computer
    • Summary
  • Chapter 7: Spying on Web Browsing
    • Introduction
    • What Is Web Browsing?
    • What Can You Get from Web Browsing?
    • Typical Web Browsers
    • Basic Skills
    • Collecting Information from Your Target’s Computer
    • Collecting Information about Your Target from the Network
    • Summary


No. of pages:
© 2005
Print ISBN:
Electronic ISBN:

About the authors

Eric Cole

Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.

Affiliations and Expertise

Independant network security consultant and speaker, USA

Sandra Ring

Affiliations and Expertise

Deputy Directory for Research at the TSGI Advanced Technology Research Center, USA