Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Paperback
from $0.00

Author: Eric Cole

ISBN-10: 1931836418

ISBN-13: 9781931836418

Category: Personal & Private Investigation

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by...

Search in google:

Uncover the Threats Lurking in the Darkness of Your Family's Computer Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.-Dr. Eric Cole             Learn When to Spy and When Not to SpyWould spying on your spouse or child cause more damage than the problem you suspect exists?           Translate What Your Children Are Really Saying OnlineKnow what it means when your child types 420, ASL, Cyber, NSA, POS, or S2R.           Follow the SLEUTH MethodologyLearn to: Set goals, Layout strategy, Evaluate and Understand risk, Take observations, and Handle the results.           Cover Your TracksUse tools and techniques to achieve your objectives without being discovered.           Master Spying SoftwareDownload, install, and use free spying applications, including IZArc, WinSpy, and Kaboodle.           You Got That with Google?Use Google and the Google Desktop Search tool to scan and classify public records; blogs; online databases; credit reports; phone and address listings; e-mails; IM chats; files; Web caches; and more.           One Person's Trash....Use PC Inspector File Recovery to retrieve and restore deleted files.           Expand Your SearchGo beyond the PC to uncover information on switched networks, PDAs, cell phones, iPods, and even video game consoles.           Know When the Tables Have TurnedDetermine if you are someone else's mark and take steps to protect yourself.   Your Solutions Membership Gives You Access to: A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page"From the Author" Forum where the authors post timely updates and links to related sitesThe complete code listings from the book Downloadable chapters from these best selling books:              Google Hacking for Penetration Testers              Inside the Spam Cartel: Trade Secrets from the Dark Side              Hacking a Terror Network: The Silent Threat of Covert Channels              Stealing the Network: How to Own a Continent

Why Spy?Spying BasicsTechnology Overview: Computer BasicsNetwork BasicsTaking ControlSpying on the PCSpying on Web BrowsingSpying on E-mailSpying on Chat and Instant MessagesAdvanced TechniquesCounterspy: Are You Being Watched?