
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
- 1st Edition - March 15, 2005
- Imprint: Syngress
- Authors: Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair
- Language: English
- eBook ISBN:9 7 8 - 0 - 0 8 - 0 4 8 8 6 5 - 3
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quote- Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services
- Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level
- Targets a wide audience: personal computer users, specifically those interested in the online activities of their families
Acknowledgments
Authors
Technical Editor
Foreword
Chapter 1: Why Spy?
Introduction to Spying
Pray for Peace, Prepare for War
Ethics of Spying
Spying on Spouses
Spying on Your Children
When You Should Not Spy
Real-World Case Study
Summary
Chapter 2: Spying Basics
Introduction
Goals of Spying
Psychology of Spying
Spying Methodology
Using Overt Monitoring as a Deterrent
Using Covert Spying to Observe Behavior
Demonstration
Case Study: Dangers of Misinterpretation and Distrust
Summary
Chapter 3: Technology Overview: Computer Basics
Introduction
Hardware
Software
Summary
Chapter 4: Network Basics
Introduction
Network Basics
IP Address
Network Traffic
Summary
Chapter 5: Taking Control
Introduction
Cover Your Tracks
Basic Skills
Software You Will Use
Mastering Your Domain
Summary
Chapter 6: Spying on the PC
Introduction
Mission 1: Collect the Basics
Mission 2: Examining the Past
Mission 3: Live for the Present
Mission 4: Prepare for the Future
Mission 5: Look for Hidden Information
Case Study: Expand Your Investigation Beyond the Local Computer
Summary
Chapter 7: Spying on Web Browsing
Introduction
What Is Web Browsing?
What Can You Get from Web Browsing?
Typical Web Browsers
Basic Skills
Collecting Information from Your Target’s Computer
Collecting Information about Your Target from the Network
Summary
Chapter 8: Spying on E-mail
Introduction
Overview of E-mail
Popular E-mail Clients
Web Mail
Collecting E-mail
Case Study: Return to Sender
Summary
Chapter 9: Spying on Chat and Instant Messages
Introduction
What Is Instant Messaging?
Types of Chat and Instant Messaging
Collecting Passwords and Buddy Lists
Collecting Chat and Instant Messages
Impersonation
Summary
Chapter 10: Advanced Techniques
Introduction
Improving Your Skills
Expanding Your Horizons
Summary
Chapter 11: Counterspy: Are You Being Watched?
Introduction
How to Be Sneaky
How to Tell If You Are Being Watched
How to React If You Are a Target
Identifying Who is Spying on You
A Note about Spyware
Case Study: Guilt is for Suckers, Not Spies
Summary
Index
- Edition: 1
- Published: March 15, 2005
- Imprint: Syngress
- No. of pages: 400
- Language: English
- eBook ISBN: 9780080488653
EC
Eric Cole
SR