Computer control software is a double-edged sword
Currently, personal computer control application is developing quite a lot. You can use them to track children's activities or uninvited guests. However, if unfortunately sit on a strange PC, install the program
Currently, personal computer control application is developing quite a lot. You can use them to track children's activities or uninvited guests. However, if unfortunately sitting on a strange PC with this program installed, all your operations will be recorded.
The mechanism of these software is faithfully monitoring keystrokes and screenshots on the computer being used or in a remote place (on the LAN or on the Internet), as long as The same machine also has the same program installed. Others also have the ability to track every incoming and outgoing stream in chat applications, send e-mail .
At this point, the boundary between the concept of "utility" that controls PC and spyware (spyware) becomes very fragile. Spyware is something that spammers have to hide in some download program to wait for the "victim" to download, it will automatically infiltrate the computer system, steal information and send it to the server on the Internet. . The well-known control "utility" is publicly available on the list of software developed for PCs and therefore anti-virus and spyware programs are considered "family members". However, its "reverse" use will be promoted when someone uses it for the purpose of monitoring someone else's computer.
For software applications posted on download.com, a popular CNet site, like XT Spy, e-Surveiller, All in One Keylogger . They are very effective when you want to see who has used your device. or control what your child is doing on it. But if these programs are installed on public computer systems such as Internet cafes, users are at risk of exposing a huge amount of information.
One point worth noting is that these types of software are not displayed in the Task Manager manager or Control Pannel> Add or Remove Programs. Therefore, users who do not know it cannot remove it completely without knowing the password. Particularly, the software also eliminates the function of Task Manager.
Therefore, if you are not assured when surfing the web somewhere, apply measures to check in advance such as in the Start menu or Program Files folder to detect such programs and then delete them manually (remember Select the function to display hidden files). Then, go to the Recycle Bin and select the Empty function. Programs that lose files will no longer be executable.
Thuy Huong
- Eye drops - double-edged sword
- These are the swords that have
- Antiseptic - double-edged sword
- Pain reliever Aspirin - a double-edged sword for cancer prevention
- Why can terrorists bring disguised bombs into laptops over the airport without being detected?
- Differences in swords of Europe and Asia
- 10 legendary swords in world history
- Treasure sword is still shiny after 2700 years of Viet Vuong Cau Tien
- Aromatic essential oils: Assassins silently?
- Discover the 9 most mysterious swords in the world
What is the Snapdragon SiP chip? How to create a yellow circle around the mouse cursor on Windows Edit the Boot.ini file in Windows XP 3 ways to restart the remote computer via the Internet Vietnam computer market: Looking back a year How to restore deleted applications on Android How to increase the capacity of C drive on Windows 10, 8, 7 ... 8 security features of Windows operating system