I've written
several times about computer scams, but this is the first time that
I've written about computer hijacking, when crooks use viruses or
networking skills to hack into your PC to steal information or
monitor your activities. But there's a more sinister variation has
surfaced recently, where computers are hijacked by so-called friends
or family members to spy on your activities. Think it couldn't
happen to you? Well, just to give a recent example:
A Delaware man was convicted in October of putting a spyware program on his father's computer to capture passwords so he could read his emails. There was a more disturbing element to the story -- the father actually became a murder victim, though there was no suggestion in court that the two aspects were connected. However, in the course of his spying, the son discovered his father had been having an affair. And even though the son had planted the spyware with his mother's approval, he was still convicted of unlawfully using the computer for fraud purposes.
Of course, there are circumstances when spying programs may be used legitimately (although some would still question their use). But the plain fact is that it's perfectly possible for a friend or relative, or indeed, anyone who handles your PC, to spy on your actions if they have a motive for doing so -- or if they're just control freaks.
The two most common ways they would do this would be:
Either way, here are some of the things the top-selling computer monitoring program claims it can do:
One final thing, remember that whenever you use a PC at home, it's perfectly possible for another user in your household to see which Internet sites you visited by simply clicking on the "History" setting in your browser. Also, if you didn't shut down when you finished or if your computer is set up to automatically log you into certain accounts, another user might be able to access them and see what you've been doing or buying. So, if you have reasons to want to maintain confidentiality on your home PC, always shut down after use, password protect sensitive files, change your passwords frequently, clear your Internet history and clear your cookies -- the fragments of computer code that automatically sign you on to your accounts. You can find out how to do these last two things via either your computer's security settings or its help file usually located in the Control Panel.
I'm sorry if all this computer spying stuff sounds a bit alarming. After all, most of us have friends and families whose trustworthiness is beyond reproach and beyond doubt. But if you ever find yourself in a situation where that trust is in danger of being lost, at least you now know the risks of this type of computer hijacking -- and what you can do about it.
One last thing, Never give anyone your personal password to your personal computer, if they want to use it, go to user accounts and set them up an account for their use only. Be sure to lock out their ability to read your personal files.
A Delaware man was convicted in October of putting a spyware program on his father's computer to capture passwords so he could read his emails. There was a more disturbing element to the story -- the father actually became a murder victim, though there was no suggestion in court that the two aspects were connected. However, in the course of his spying, the son discovered his father had been having an affair. And even though the son had planted the spyware with his mother's approval, he was still convicted of unlawfully using the computer for fraud purposes.
Of course, there are circumstances when spying programs may be used legitimately (although some would still question their use). But the plain fact is that it's perfectly possible for a friend or relative, or indeed, anyone who handles your PC, to spy on your actions if they have a motive for doing so -- or if they're just control freaks.
The two most common ways they would do this would be:
- If they ever
have unaccompanied access to your PC that enables them to install
monitoring programs.
- If they know
your username and passwords. They don't even need access to your
computer -- they can simply log on to your accounts or online email
servers and see what you've been up to.
Either way, here are some of the things the top-selling computer monitoring program claims it can do:
- Record passwords
- Watch email
- Operate web cameras
- Capture full screen images
- Upload and download files
- Produce
reports on websites you've visited
One final thing, remember that whenever you use a PC at home, it's perfectly possible for another user in your household to see which Internet sites you visited by simply clicking on the "History" setting in your browser. Also, if you didn't shut down when you finished or if your computer is set up to automatically log you into certain accounts, another user might be able to access them and see what you've been doing or buying. So, if you have reasons to want to maintain confidentiality on your home PC, always shut down after use, password protect sensitive files, change your passwords frequently, clear your Internet history and clear your cookies -- the fragments of computer code that automatically sign you on to your accounts. You can find out how to do these last two things via either your computer's security settings or its help file usually located in the Control Panel.
I'm sorry if all this computer spying stuff sounds a bit alarming. After all, most of us have friends and families whose trustworthiness is beyond reproach and beyond doubt. But if you ever find yourself in a situation where that trust is in danger of being lost, at least you now know the risks of this type of computer hijacking -- and what you can do about it.
One last thing, Never give anyone your personal password to your personal computer, if they want to use it, go to user accounts and set them up an account for their use only. Be sure to lock out their ability to read your personal files.
No comments:
Post a Comment
Please be considerate of others, and please do not post any comment that has profane language. Please Do Not post Spam. Thank you.