Computer control software is a double-edged sword

Currently, personal computer control application is developing quite a lot. You can use them to track children's activities or uninvited guests. However, if unfortunately sit on a strange PC, install the program

Picture 1 of Computer control software is a double-edged sword
Currently, personal computer control application is developing quite a lot. You can use them to track children's activities or uninvited guests. However, if unfortunately sitting on a strange PC with this program installed, all your operations will be recorded.

The mechanism of these software is faithfully monitoring keystrokes and screenshots on the computer being used or in a remote place (on the LAN or on the Internet), as long as The same machine also has the same program installed. Others also have the ability to track every incoming and outgoing stream in chat applications, send e-mail .

At this point, the boundary between the concept of "utility" that controls PC and spyware (spyware) becomes very fragile. Spyware is something that spammers have to hide in some download program to wait for the "victim" to download, it will automatically infiltrate the computer system, steal information and send it to the server on the Internet. . The well-known control "utility" is publicly available on the list of software developed for PCs and therefore anti-virus and spyware programs are considered "family members". However, its "reverse" use will be promoted when someone uses it for the purpose of monitoring someone else's computer.

For software applications posted on download.com, a popular CNet site, like XT Spy, e-Surveiller, All in One Keylogger . They are very effective when you want to see who has used your device. or control what your child is doing on it. But if these programs are installed on public computer systems such as Internet cafes, users are at risk of exposing a huge amount of information.

One point worth noting is that these types of software are not displayed in the Task Manager manager or Control Pannel> Add or Remove Programs. Therefore, users who do not know it cannot remove it completely without knowing the password. Particularly, the software also eliminates the function of Task Manager.

Therefore, if you are not assured when surfing the web somewhere, apply measures to check in advance such as in the Start menu or Program Files folder to detect such programs and then delete them manually (remember Select the function to display hidden files). Then, go to the Recycle Bin and select the Empty function. Programs that lose files will no longer be executable.

Thuy Huong

Update 12 December 2018
« PREV
NEXT »
Category

Technology

Life

Discover science

Medicine - Health

Event

Entertainment