Uncover the Threats Lurking in the Darkness of Your Family's Computer
Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.--Dr. Eric ColeLearn When to Spy and When Not to SpyWould spying on your spouse or child cause more damage than the problem you suspect exists?
Translate What Your Children Are Really Saying OnlineKnow what it means when your child types 420, ASL, Cyber, NSA, POS, or S2R.
Follow the SLEUTH MethodologyLearn to: Set goals, Layout strategy, Evaluate and Understand risk, Take observations, and Handle the results.
Cover Your TracksUse tools and techniques to achieve your objectives without being discovered.
Master Spying SoftwareDownload, install, and use free spying applications, including IZArc, WinSpy, and Kaboodle.
You Got That with Google?Use Google and the Google Desktop Search tool to scan and classify public records; blogs; online databases; credit reports; phone and address listings; e-mails; IM chats; files; Web caches; and more.
One Person's Trash...Use PC Inspector File Recovery to retrieve and restore deleted files.
Expand Your SearchGo beyond thePC to uncover information on switched networks, PDAs, cell phones, iPods, and even video game consoles.
Know When the Tables Have TurnedDetermine if you are someone else's mark and take steps to protect yourself.
Your Solutions Membership Gives You Access to:
A compr
Show moreUncover the Threats Lurking in the Darkness of Your Family's Computer
Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.--Dr. Eric ColeLearn When to Spy and When Not to SpyWould spying on your spouse or child cause more damage than the problem you suspect exists?
Translate What Your Children Are Really Saying OnlineKnow what it means when your child types 420, ASL, Cyber, NSA, POS, or S2R.
Follow the SLEUTH MethodologyLearn to: Set goals, Layout strategy, Evaluate and Understand risk, Take observations, and Handle the results.
Cover Your TracksUse tools and techniques to achieve your objectives without being discovered.
Master Spying SoftwareDownload, install, and use free spying applications, including IZArc, WinSpy, and Kaboodle.
You Got That with Google?Use Google and the Google Desktop Search tool to scan and classify public records; blogs; online databases; credit reports; phone and address listings; e-mails; IM chats; files; Web caches; and more.
One Person's Trash...Use PC Inspector File Recovery to retrieve and restore deleted files.
Expand Your SearchGo beyond thePC to uncover information on switched networks, PDAs, cell phones, iPods, and even video game consoles.
Know When the Tables Have TurnedDetermine if you are someone else's mark and take steps to protect yourself.
Your Solutions Membership Gives You Access to:
A compr
Show moreWhy Spy?
Spying Basics
Technology Overview, Computer Basics
Technology Overview, Network Basics
Step 1: Taking Control
Step 2, Spying on the PC
Spying on E-mail
Spying on Chat and Instant Messaging
Spying on Web Browsing
Advanced Spying
Counter-Spy, Are You Being Watched?
Dr. Eric Cole is an industry recognized security expert, technology visionary and scientist, with over 15 year’s hands-on experience. Dr. Cole currently performs leading edge security consulting and works in research and development to advance the state of the art in information systems security. Dr. Cole has over a decade of experience in information technology, with a focus on perimeter defense, secure network design, vulnerability discovery, penetration testing, and intrusion detection systems. Dr. Cole has a Masters in Computer Science from NYIT, and Ph.D. from Pace University with a concentration in Information Security. Dr. Cole is the author of several books to include Hackers Beware, Hiding in Plain Site, Network Security Bible and Insider Threat. He is also the inventor of over 20 patents and is a researcher, writer, and speaker for SANS Institute and faculty for The SANS Technology Institute, a degree granting institution.
![]() |
Ask a Question About this Product More... |
![]() |