LIMITED OFFER
Save 50% on book bundles
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues… Read more
LIMITED OFFER
Immediately download your ebook while waiting for your print delivery. No promo code needed.
Acknowledgments
Authors
Technical Editor
Foreword
Chapter 1: Why Spy?
Introduction to Spying
Pray for Peace, Prepare for War
Ethics of Spying
Spying on Spouses
Spying on Your Children
When You Should Not Spy
Real-World Case Study
Summary
Chapter 2: Spying Basics
Introduction
Goals of Spying
Psychology of Spying
Spying Methodology
Using Overt Monitoring as a Deterrent
Using Covert Spying to Observe Behavior
Demonstration
Case Study: Dangers of Misinterpretation and Distrust
Summary
Chapter 3: Technology Overview: Computer Basics
Introduction
Hardware
Software
Summary
Chapter 4: Network Basics
Introduction
Network Basics
IP Address
Network Traffic
Summary
Chapter 5: Taking Control
Introduction
Cover Your Tracks
Basic Skills
Software You Will Use
Mastering Your Domain
Summary
Chapter 6: Spying on the PC
Introduction
Mission 1: Collect the Basics
Mission 2: Examining the Past
Mission 3: Live for the Present
Mission 4: Prepare for the Future
Mission 5: Look for Hidden Information
Case Study: Expand Your Investigation Beyond the Local Computer
Summary
Chapter 7: Spying on Web Browsing
Introduction
What Is Web Browsing?
What Can You Get from Web Browsing?
Typical Web Browsers
Basic Skills
Collecting Information from Your Target’s Computer
Collecting Information about Your Target from the Network
Summary
Chapter 8: Spying on E-mail
Introduction
Overview of E-mail
Popular E-mail Clients
Web Mail
Collecting E-mail
Case Study: Return to Sender
Summary
Chapter 9: Spying on Chat and Instant Messages
Introduction
What Is Instant Messaging?
Types of Chat and Instant Messaging
Collecting Passwords and Buddy Lists
Collecting Chat and Instant Messages
Impersonation
Summary
Chapter 10: Advanced Techniques
Introduction
Improving Your Skills
Expanding Your Horizons
Summary
Chapter 11: Counterspy: Are You Being Watched?
Introduction
How to Be Sneaky
How to Tell If You Are Being Watched
How to React If You Are a Target
Identifying Who is Spying on You
A Note about Spyware
Case Study: Guilt is for Suckers, Not Spies
Summary
Index
EC
SR