Contents:
The reason is usually a poor management that is oriented on micromanagement.
Based on our experience we can say that the bigger the company you work for or department is, the less there is a chance for you to be spied on. Because spying requires recording of pretty large volume of information. Also it is a pretty time consuming to analyze the spying results.
Besides, spying practices might lead to legal problems, that is why serious companies, especially the ones that have legal departments would not apply spying functionality. Spying practices are most common among small companies where the bosses think they could improve their business by spying on every movement of their employees. They often take their laptops at home or in business trips, so employees have laptops with them not only during business hours but also out of working time.
And employees do not want such information to be uncovered. That is why they start to worry more about whether they are being spied on. Such kind of monitoring equates to spying on your personal computer desktop or laptop. If your spouse has an access to your computer, then yes, there is a possibility to install spying software on your computer. Spying might be used for investigation purposes. It really depends on the case and on the organization you work for.
In case of investigating something on your computer there must be legal reasons for that. To summarize all of the information mentioned above: Not always, but it is possible. In case it is used improperly, it might lead to legal issues. If you are concerned about being spied on, you can use software for detecting spying processes on your computer. And remember, no one is allowed to spy on your personal information, on your computer. Except the investigation cases, anyone must get your consent in order to spy on your computer. Download Enjoy your instant download and one-button-click-straight-forward design: How To Use Easy!
The whole process takes just 1 minute: Am I Being Spied On? WorkTime Cloud Web based employee monitoring service to monitor employees remotely and in-office. WorkTime Professional Project and time tracking software for self-employed, professionals, contract workers. There is no need for this, it is these 'subtle functional intrusions' that Microsoft prefers.
I honestly do not know what is going on in these people's heads, to think for one second, that the world would spot this a million miles off. It really does show the level of intelligence these people have; my dog demonstrates more social engineering skills when looking for food.
Done by design very poorly executed. Auto-Complete Designed to record search terms, web addresses, and anything else it can get its grubby little digital hands on, for rapid post-forensic retrieval. MSN Messenger Microsoft has been retaining each persons deleted contacts from messenger.
Messenger is also activated on accessing Hotmail. Microsoft claims to be using the 'features' provided by Messenger and will not allow it to be disabled. The 'features' provided by MSN Messenger are the transmission and reception of typed text and files. So, Microsoft has stated that it is, 'transmitting typed text and files', to and from, end users machines, when hotmail is being accessed. Web-Cams and Microphones These devices can be remotely activated providing visual and audio feedback from the target subject. There is also no way of telling if your devices have been remotely activated.
These features are demonstrated in 'proof of concept' applications such as NetBus, etc. With raw sockets or driver this information can bypass your firewall without any problems. Microsoft Windows XP Services 1. This thing just loves making remote connections and accepting them. Set this up in your firewall to ask each time using ADSL or higher. Automatic Updates Microsoft's Description: Enables the download and installation of critical Windows updates. If the service is disabled, the operating system can be manually updated at the Windows Update Web site.
Enables Microsoft to distribute and incorporate any 'feature', at will.
Not the greatest thing in the Universe to be allowing. Computer Browser Microsoft's Description: Maintains an updated list of computers on the network and supplies this list to computers designated as browsers. If this service is stopped, this list will not be updated or maintained.
If this service is disabled, any services that explicitly depend on it will fail to start. This stupid design will breach security. The only computer a client needs to know, is the server and it should coordinate everything. Why does Microsoft Windows identify and map every computer on the network?
The design principal is based upon 'remote orientation' requirements, using insecure clients as targets. Servers would be difficult to compromise and arouse to much suspicion. The flow of information on any network is about 'the need to know'. Clients do not need to know any other computer, other than the server. The server acts as a 'proxy' to the entire network, data transfers may, optionally, be proxied too.
Provides management for applications that require assistance in a multiple user environment. Switches to every account, but the Administrator account. In fact, unless you know exactly what your doing, an end user cannot access the administrator account.
Post-Forensics can, that includes your Windows Encrypting Filesystem. If this service is stopped, this computer will be unable to record CDs. Part of CD Burning and this thing is a nightmare. Any CD you make, it first makes a copy to the system drive, then only to use a scratch drive after that. That action is a waste of time. This is designed to generate 'ghost images' that can be recovered by Magnetic Force Microscopy. It is unlikely that the target subject will destroy their boot drive. Also, pointing the scratch to another drive, just makes more ghost copies.
That would suggest a cached image of some form. Indexing Service Microsoft's Description: Indexes contents and properties of files on local and remote computers; provides rapid access to files through flexible querying language. A search using the DOS emulator will run like a bullet. Windows search, however, will take its time unless the indexing service is activated.
This provides quick post-forensic and real-time access to files remote files. This behavior is by design. I have even caught calc. Without reverse engineering, I was unable to tell if it really was the applications, or a subsystem calling the applications. This even bypasses most domestic firewalls or security setups, unless specific options are set in the firewall.
This allows for remote access to files, documents, etc.
Expect your machine to freeze when performing any remote operations for up to 4 minutes at a time i. The reason for behavior is that native SAMBA is designed for 10Mbit networks at least and is therefore a very bulky protocol. Also, the remote host may be using their Internet connection, have a low bandwidth connection or performing processor intensive tasks. A quick examination of Sygate's instruction on how to use their firewall with ICS, reveal that your kernel cannot be blocked, nor can several other systems.
These systems are not required on a LAN, so Microsoft has designed these systems to breach security. As a programmer I know Network Address Translation is simply a case of storage and substitution of IP addresses, with a few whistles and bells. There is no excuse for these systems to be exposed to the network. Transmits net send and Alerter service messages between clients and servers.
This service is not related to Windows Messenger. If this service is stopped, Alerter messages will not be transmitted. Messages should only be broadcast, by and to, the main server. Having this on every machine provides a method of transmitting real-time keystroke intercept across the Internet. This service is also enabled by default, even with the known Internet abuse of the function. This only indicates design manipulation. Network Connections Microsoft's Description: Manages objects in the Network and Dial-Up Connections folder, in which you can view both local area network and remote connections.
Only weakens security by providing a central reporting mechanisms. These aspects have been combined by design, with no logical requirement for the function. Again, a single-point of failure is introduced into the system. Protected Storage Microsoft's Description: Provides protected storage for sensitive data, such as private keys, to prevent access by unauthorized services, processes, or users.
Also provides quick access to this information. Swift breaking of security. Provides the endpoint mapper and other miscellaneous RPC services. May the saints preserve us from RPC. What sort of idiotic decision making was behind an RPC service that cannot be disabled? You're practically there anyway! I'm just losing my head now! Remote Registry Microsoft's Description: Enables remote users to modify registry settings on this computer. If this service is stopped, the registry can be modified only by users on this computer. This nifty service is enabled by default.
It provides remote access to the windows registry, allowing run-time modifications to be made to your PC. Just what I always needed, a way to 'tweak' my running spy applications remotely. Supports file, print, and named-pipe sharing over the network for this computer. If this service is stopped, these functions will be unavailable.
This is not required, it provides a central management for open files and printing operations. It also provides a method of remotely monitoring a users activities. It is linked to the authentication, so if the server collapses, so does the entire network, as this is managed by the server. Again, security and functionality have been manipulated to focus on information retrieval and access. Enables discovery of UPnP devices on your home network. What in Gods name for? This is part of the 'remote orientation' facilities encoded into Windows, allowing remote hackers the ability to explore the network swiftly, reducing chances of alarm and excessive activity through exploration.
System Event Notification Microsoft's Description: Tracks system events such as Windows logon, network, and power events. No way of knowing, without full reverse engineering, how many undocumentented events exist throughout Windows. Windows could have an entire additional level of event reporting. Event and thread management in Windows is very suspicious due to its sluggish and sometimes unpredictable behavior.
Download Spy Software for Windows XP. Free and safe download. Download the latest version of the top software, games, programs and apps in Download Spy App for Windows XP. Free and safe download. Download the latest version of the top software, games, programs and apps in
Compensation for this is normally done by 'peeking' into the message cue, however, sometimes it simply refuses to work. This would tend to suggest the interaction of an unknown component or several component with the event system producing conflicts. System Restore Service Microsoft's Description: Performs system restore functions.
Keeps ghost copies of various forms of cached information in a nice quick accessible format. We can't let our hard earned information go down the pan now. Terminal Services Microsoft's Description: Allows multiple users to be connected interactively to a machine as well as the display of desktops and applications to remote computers. I just bet its interactive and highly 'functional' too. This is enabled by default, providing a remote desktop for any hacker.
I'll agree with you on this one, that is a 'service and a half'! Windows Time Microsoft's Description: Maintains date and time synchronization on all clients and servers in the network. If this service is stopped, date and time synchronization will be unavailable. Sends information to Microsoft and keeps your date and time stamps nice and fresh for post-forensic analysis. At least they're tidy when they invade your privacy. Wireless Zero Configuration Microsoft's Description: Provides automatic configuration for the Zero configuration means zero security and that's exactly what you get.
The entire network is exposed to anyone within reception range. Therefore, if you are using this in your home environment, that can mean remote monitoring from up to 3Km using proper equipment, or someone else using your Internet connection from a range of around m radius. There is no other acceptable excuse for that level of incompetence. Microsoft Works Breach of trade descriptions act? Really, it is an 'implied' suggestion based on the play of words. It can be described as 'psychologically misleading', human psychology is extremely complex, even if most humans are not.
This implied statement is registered at a deeper level of the brain and assigned its true meaning. Otherwise, you would have never considered the relationship in the first place. One way of describing this is, 'marketing', the accurate description is 'subliminal programming', it does not matter how slight the incident. This is very, similar in style, to the 'French Fries' and 'Freedom Fries' incident in the US, used to blind the US citizens from war opposition, through manipulation of patriotic beliefs.
Windows Security, Not What You Think Since all security products that operate on the Microsoft Platform are both designed from, and encapsulated by the OS, then it is ultimately Microsoft Windows that is providing your security and not your firewall, etc.
So, any product that claims to provide security FOR windows, is simply reflecting the limited understanding the company has of what it is doing. I bet that will inspire confidence in computer security. As we seen in 'Raw Sockets', this does not always happen. Linux does not have this problem, as the systems is a mosaic rather than a full encapsulation, or sandbox environment.
Therefore, even with all the security, in the known Universe, installed on a Microsoft Windows Platform, it is still the responsibility of Windows to inform the security products of each event happening. This is a source of great concern with Microsoft's plans to encrypt the system area of new versions of Microsoft Windows. Somehow, I don't think this system, nor any variation of it, will ever see the light of day.
If this was to happen the encrypted system , instead of an EULA, I think Microsoft Windows should be required to read end-users their rights. Microsoft is not the Law, nor is it above it, in any way. You have the right to be bugged, click OK to continue! Ten, maybe fifteen years, and we are seriously asked to believe that a company with the financial resources of Microsoft cannot a create a bug-free Operating System?
Companies with lesser resources than Microsoft provide such systems for Air-Traffic control and medical purposes Heart Monitors, etc. A perfect example here is OpenBSD. OpenBSD is a free Operating System and with very little funding nowhere near what Microsoft has, in a million years the only remote exploits you will find, anywhere in the world, will be at least 12 months old. Most of Microsoft's problems are at least that old before anyone decides to analyze them, let alone, fix them. This is a very clear example, honestly, there is no acceptable excuse here.
If Microsoft claims 'compatibility', then I simply refer them to the current deployment of service packs that destroy 'compatibility'. Also, the important thing to business is their data and data cannot have 'compatibility' issues. Its simply a binary stream that can be used on any known operating system.
Temporary Files Temporary files are retained under 'Document and Settings' for a prolonged period of time and in most case require manual clearance. But we have devices called military jammers which are used by the soldiers in iraq and afghanistan to prevent ied detonations. Just what I always needed, a way to 'tweak' my running spy applications remotely. I love these tv antenna rotators. An indispensable condition to the prolongation of the war was the running of the blockade of southern ports by the swift cruisers built and fitted expressly for the purpose. Now 'fragmentation' is a well known source of problems when accessing information.
Wild Speculation On Codenaming Strategy Microsoft has had a consistent naming policy for its operating systems, in the form of city names. Code names for various releases have included; Chicago, Memphis, etc. Now all this changed with the arrival of Windows XP. Its codename was 'whistler' and the next version of Windows is codenamed 'LongHorn'.
I was interested in the reasoning behind the switch. I was thinking that these codenames could be based on one, or more, of the following points: A play on the term 'whistleblower'? A play on a reference to 'pinocheo'? Horn, as in a form of 'early warning system' and Long because of its distributed nature? Can Windows Be Secured? Recommended Otherwise, due to its encapsulated nature, the answer is a pointblank, no. Thanks Intel, but, we'll pass on that one, nice to see you are thinking of everybody for a change. If anyone is wondering what on Earth is going on, well Congress went a little nuts passing resolutions, without its normal due caution.
As such, mistakes can only be expected, congress is still only human, despite the rumors. I wouldn't like to consider the implications of that statement 'being inaccurate'. I know many readers would be enjoy this analysis taken further, however, it is well beyond the scope of this report. It is also an area I feel is best left to the authorities. This leads to three important questions: I only mention this to be fair, rather than shoot first, ask questions later.
I'm a Zen Buddhist and politics, ain't my bag baby. Google's ranking methods have come under question recently and in the context of this report, I think the follow will speak volumes for itself: Search for the term 'Book'. Conducted September 11th, Top 10 results from Google. May I remind everyone that Google is behind nearly every major search engine in the World. Is this what they describe as 'free enterprise' in action?
I wouldn't like to see systematic manipulation of the global economy, if that's the case. A Small Bit of Advice Linux Conclusion Is America awake? Remember a small concept called Liberty? Its French, by the way. This one, I really must hear. Symbiotic Duality Appendix 2. Symbiotic Duality The first thing you must accept is that a product does not have to be limited to a single purpose. The second thing to be accepted is that you may not be aware of any other purpose, even to the extent of being unaware of its primary purpose.
Purpose comes from design, not usage. Therefore, a product, such as Microsoft Windows can give the impression of being an Operating System, whilst having been designed for an entirely different purposes. This is the concept of 'Symbiotic Duality', it is the basis of all manifestations of depth. We'll look at a few quick examples: When you fight with someone you love, you can hate them, yet still love them.
This form 'Symbiotic Duality' is experienced as a 'depth' of emotion, it stems from the observed contrast, or gulf, between opposing emotions. The greater the gulf between the conflicting emotions, the more intense the experience. It is from this understanding that the, very accurate phrase, 'Fighting is a sign of love', is drawn from. One cannot exist without the other and 'Symbiotic Duality' is a fundamental step in every emotional response. Its not like I much choice in the matter b.
To produce the effect of Depth in a scene. An image contrasting near and far large and small produces the illusion of depth. This is another form of 'Symbiotic Duality', the contrast between near and far large and small produces an optical illusion, both aspects function as one, from opposing sides. A depth of character can be expressed in apparently conflicting viewpoints. You may both agree and disagree with a situation, for various reasons.
For example, you may not agree with war, but you recognize a time comes when it must occur, or, you may not agree with a situation, but since it is happening, you may as well make the best of it. The greater the depth of character, the greater the gulf will be between these conflicting thoughts there will be. A person who repeats the same 'statements or rhetoric' time and time again, has very little intelligence and certainly lacks any depth of character, as they lack the opposing viewpoint.
The gulf between the people and government leads to increased anxiety, fear, paranoia and rejection. The more 'stark' a contrast between government and the people, the greater the 'perceived gulf' will become. This concept is explored in George Orwell's book 'Animal Farm', it examines the 'US and Them' principle, and unknowingly, touches on the 'Symbiotic Duality' of the scenario. That is, the common source of conflict between the two groups, the 'perceived gulf' that exist between them. By bridging that gulf, the situation may have been avoided.
Why is 'Symbiotic Duality' important to understand? The simple reason for this is that, 'depth', is a perception. If a 'Symbotic Duality' appears in an investigation, a human was involved in planning. By clearly identifying the contrasting behaviors of any system, the design choices made by humans and those dictated to by system requirements, can be distinguished with repeatable methodology. This separation allows for both reliable, rapid identification of human design choices that fall outside compliance with system specifications, or other known base references i.
Scientific investigators must operate by rigid procedures and methods, the concept of 'Symbiotic Duality' provides such a structure, this allows for repetition of the investigative procedure, rather than solely relying on expert testimony and Police accounts. It provides a roadmap for the investigation, with one point naturally flowing to another, or any amount of other points. Let's say for example we were investigating an email application.
Firstly, we remove from the equation the basic technical functions of the application. This leave us with what can be described as a 'human-defined design'. That is, all the fluff added to an application to make it 'user friendly' and operational. From here, we list each of the 'features' and a description of their functions. Next, we begin the 'Symbiotic Duality' analysis, by contrasting the basic technical requirement to implement a 'feature' against the actual implementation. There are various sub-aspects to this procedure, such as contrasts from different 'perspectives'.
This would include examining ease of information retrieval, information storage, information movement, information processing, network communication attempts, etc. By contrasting what would be 'expected', under reasonable circumstances, against what is actually there, the 'gulf' form of perceived depth between the two states is revealed Symbiotic Duality. The procedure uses the 'Russian Doll' and Henry Ford Conveyor Belt principles, to break down the application into smaller and smaller units in a systematic exploration of the target system. The method is highly flexible, in that, it does not require a linear approach to investigation, but rather, a completely random approach is recommended.
This can match budgets and resources of investigative departments. This gels beautifully with the 'chain of custody' model. What we are left with, is a combination of fluff and 'Interest Motivated' sections of the application. Its simply a matter of contrasting the expected characteristics of fluff against the remaining sections of code. As many investigators will have realized by now, adaptations of this can be applied to any form of of investigative procedure.
If you are interested in 'Symbiotic Duality', I'm afraid you will not find it in any texts, it was something I developed as part of my work to assist me. An in-depth understanding human psychology is a basic requirement in this field, as you must always think, what would this person do? I don't claim that this is any form of great new method, I just use it to assist my own work and it also has no form of recognition as an accepted method. Its simply another tool, in a long list, of analytical procedures and, in my line of work, every assistance is a bonus.
I like to think of this procedure as a: The best visual representations would most likely be in the form of a 'tree' structure, expressed in 3D. Each 'Symbiotic Duality' identified can be provided a 'score' ranking , and numerous sub-scores sub-rankings if required. The ranking system, has an unlimited user-defined scale. This allows for statistical analysis and cross-referencing, with stark contrasts.