Cyber Spying Tracking Your Family's Secret Online Lives - Sometimes Author:Ted Fair, Michael Nordfelt, Sandra Ring, Eric Cole Uncover the Threats Lurking in the Darkness of Your Family's ComputerMany people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and ... more »techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.--Dr. Eric Cole
Learn When to Spy and When Not to SpyWould spying on your spouse or child cause more damage than the problem you suspect exists?
Translate What Your Children Are Really Saying OnlineKnow what it means when your child types 420, ASL, Cyber, NSA, POS, or S2R.
Follow the SLEUTH MethodologyLearn to: Set goals, Layout strategy, Evaluate and Understand risk, Take observations, and Handle the results.
Cover Your TracksUse tools and techniques to achieve your objectives without being discovered.
Master Spying SoftwareDownload, install, and use free spying applications, including IZArc, WinSpy, and Kaboodle.
You Got That with Google?Use Google and the Google Desktop Search tool to scan and classify public records; blogs; online databases; credit reports; phone and address listings; e-mails; IM chats; files; Web caches; and more.
One Person's Trash...Use PC Inspector File Recovery to retrieve and restore deleted files.
Expand Your SearchGo beyond the PC to uncover information on switched networks, PDAs, cell phones, iPods, and even video game consoles.
Know When the Tables Have TurnedDetermine if you are someone else's mark and take steps to protect yourself.
Your Solutions Membership Gives You Access to:A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page"From the Author" Forum where the authors post timely updates and links to related sitesThe complete code listings from the bookDownloadable chapters from these best selling books:Google Hacking for Penetration TestersInside the Spam Cartel: Trade Secrets from the Dark SideHacking a Terror Network: The Silent Threat of Covert ChannelsStealing the Network: How to Own a ContinentCONTENTS:Why Spy?Spying BasicsTechnology Overview: Computer BasicsNetwork BasicsTaking ControlSpying on the PCSpying on Web BrowsingSpying on E-mailSpying on Chat and Instant MessagesAdvanced TechniquesCounterspy: Are You Being Watched?