O'Reilly logo

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Book Description

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
  • Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services
  • Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level
  • Targets a wide audience: personal computer users, specifically those interested in the online activities of their families

Table of Contents

  1. Cover
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Acknowledgments
  6. Authors
  7. Technical Editor
  8. Foreword
  9. Chapter 1: Why Spy?
    1. Introduction to Spying
    2. Pray for Peace, Prepare for War
    3. Ethics of Spying
    4. Spying on Spouses
    5. Spying on Your Children
    6. When You Should Not Spy
    7. Real-World Case Study
    8. Summary
  10. Chapter 2: Spying Basics
    1. Introduction
    2. Goals of Spying
    3. Psychology of Spying
    4. Spying Methodology
    5. Using Overt Monitoring as a Deterrent
    6. Using Covert Spying to Observe Behavior
    7. Demonstration
    8. Case Study: Dangers of Misinterpretation and Distrust
    9. Summary
  11. Chapter 3: Technology Overview: Computer Basics
    1. Introduction
    2. Hardware
    3. Software
    4. Summary
  12. Chapter 4: Network Basics
    1. Introduction
    2. Network Basics
    3. IP Address
    4. Network Traffic
    5. Summary
  13. Chapter 5: Taking Control
    1. Introduction
    2. Cover Your Tracks
    3. Basic Skills
    4. Software You Will Use
    5. Mastering Your Domain
    6. Summary
  14. Chapter 6: Spying on the PC
    1. Introduction
    2. Mission 1: Collect the Basics
    3. Mission 2: Examining the Past
    4. Mission 3: Live for the Present
    5. Mission 4: Prepare for the Future
    6. Mission 5: Look for Hidden Information
    7. Case Study: Expand Your Investigation Beyond the Local Computer
    8. Summary
  15. Chapter 7: Spying on Web Browsing
    1. Introduction
    2. What Is Web Browsing?
    3. What Can You Get from Web Browsing?
    4. Typical Web Browsers
    5. Basic Skills
    6. Collecting Information from Your Target’s Computer
    7. Collecting Information about Your Target from the Network
    8. Summary
  16. Chapter 8: Spying on E-mail
    1. Introduction
    2. Overview of E-mail
    3. Popular E-mail Clients
    4. Web Mail
    5. Collecting E-mail
    6. Case Study: Return to Sender
    7. Summary
  17. Chapter 9: Spying on Chat and Instant Messages
    1. Introduction
    2. What Is Instant Messaging?
    3. Types of Chat and Instant Messaging
    4. Collecting Passwords and Buddy Lists
    5. Collecting Chat and Instant Messages
    6. Impersonation
    7. Summary
  18. Chapter 10: Advanced Techniques
    1. Introduction
    2. Improving Your Skills
    3. Expanding Your Horizons
    4. Summary
  19. Chapter 11: Counterspy: Are You Being Watched?
    1. Introduction
    2. How to Be Sneaky
    3. How to Tell If You Are Being Watched
    4. How to React If You Are a Target
    5. Identifying Who is Spying on You
    6. A Note about Spyware
    7. Case Study: Guilt is for Suckers, Not Spies
    8. Summary
  20. Index