SlideShare a Scribd company logo
1 of 4
Another key difference between traditional surveillance and
electronic surveillance is that employers can monitor workers’
computer use secretly. One popular monitoring method is
keystroke logging, which is done by means of an undetectable
program on employees’ computers. The Web site of a vendor
for Spector Pro, a popular keystroke logging
program, explains that the software can be installed to
operate in “Stealth” mode so that it “does not show up as an
icon, does not appear in the Windows system tray, . . . [and]
cannot be uninstalled without the Spector Pro password
which YOU specify” (“Automatically”). As Lane explains, these
programs record every key entered into the computer in
hidden directories that can later be accessed or uploaded by
supervisors; the programs can even scan for keywords tailored
to individual companies (128-29).
Homework for Monday, 12/5

Bring in your Tentative
thesis for your paper on the
book you’re reading.

More Related Content

Viewers also liked

Comm skills 10.17.11
Comm skills 10.17.11Comm skills 10.17.11
Comm skills 10.17.11Allan Jackson
 
3rd class 8.28.12 revised
3rd class 8.28.12 revised3rd class 8.28.12 revised
3rd class 8.28.12 revisedAllan Jackson
 
M w-f in-class 11.29.11 and homework for 12.2.11
M w-f in-class 11.29.11 and homework for 12.2.11M w-f in-class 11.29.11 and homework for 12.2.11
M w-f in-class 11.29.11 and homework for 12.2.11Allan Jackson
 

Viewers also liked (7)

Comm skills 10.17.11
Comm skills 10.17.11Comm skills 10.17.11
Comm skills 10.17.11
 
Monday 9.26
Monday 9.26Monday 9.26
Monday 9.26
 
Cl.ass 12.10.12
Cl.ass 12.10.12Cl.ass 12.10.12
Cl.ass 12.10.12
 
3rd class 8.28.12 revised
3rd class 8.28.12 revised3rd class 8.28.12 revised
3rd class 8.28.12 revised
 
Lesson plans 2.9.12
Lesson plans 2.9.12Lesson plans 2.9.12
Lesson plans 2.9.12
 
Lesson plans 4.2.12
Lesson plans 4.2.12Lesson plans 4.2.12
Lesson plans 4.2.12
 
M w-f in-class 11.29.11 and homework for 12.2.11
M w-f in-class 11.29.11 and homework for 12.2.11M w-f in-class 11.29.11 and homework for 12.2.11
M w-f in-class 11.29.11 and homework for 12.2.11
 

Similar to M w f in-class 12.2.11 and homework for 12.5

Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
sample-project-documentation.pdf
sample-project-documentation.pdfsample-project-documentation.pdf
sample-project-documentation.pdfLoki218382
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareTyler Shields
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET Journal
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Papertafinley
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?Bibek Sharma
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptxDeeJeeV
 
Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collectorwncstudent1
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfadinathfashion1
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfsagaraccura
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYODWorksPad
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationHai Nguyen
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger GiralFaurel
 

Similar to M w f in-class 12.2.11 and homework for 12.5 (20)

Keyloggers.ppt
Keyloggers.pptKeyloggers.ppt
Keyloggers.ppt
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
43 automatic
43 automatic43 automatic
43 automatic
 
sample-project-documentation.pdf
sample-project-documentation.pdfsample-project-documentation.pdf
sample-project-documentation.pdf
 
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned SoftwareBlackhat Europe 2009 - Detecting Certified Pre Owned Software
Blackhat Europe 2009 - Detecting Certified Pre Owned Software
 
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
IRJET-Enhancement of Security using 2-Factor Authentication, 2nd Factor being...
 
Sa No Scan Paper
Sa No Scan PaperSa No Scan Paper
Sa No Scan Paper
 
Key logger,Why? and How to prevent Them?
Key logger,Why? and  How to prevent Them?Key logger,Why? and  How to prevent Them?
Key logger,Why? and How to prevent Them?
 
face_detection_att.pptx
face_detection_att.pptxface_detection_att.pptx
face_detection_att.pptx
 
Key Logging.pptx.pdf
Key Logging.pptx.pdfKey Logging.pptx.pdf
Key Logging.pptx.pdf
 
Demo
DemoDemo
Demo
 
Keyboard collector
Keyboard collectorKeyboard collector
Keyboard collector
 
This project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdfThis project is broken up into Windows and Mac versions lis.pdf
This project is broken up into Windows and Mac versions lis.pdf
 
Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)Windows 10: Security Focus (part II)
Windows 10: Security Focus (part II)
 
Understanding Keylogger
Understanding KeyloggerUnderstanding Keylogger
Understanding Keylogger
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Beyond BYOD
Beyond BYODBeyond BYOD
Beyond BYOD
 
Ds netsuite-two-factor-authentication
Ds netsuite-two-factor-authenticationDs netsuite-two-factor-authentication
Ds netsuite-two-factor-authentication
 
Create a software key logger
Create a software key logger Create a software key logger
Create a software key logger
 

More from Allan Jackson

More from Allan Jackson (20)

Class thursday 3.26.15 b
Class thursday 3.26.15 bClass thursday 3.26.15 b
Class thursday 3.26.15 b
 
Class thursday 3.26.15 a
Class thursday 3.26.15 aClass thursday 3.26.15 a
Class thursday 3.26.15 a
 
Class thursday 2.12.15.a
Class thursday 2.12.15.aClass thursday 2.12.15.a
Class thursday 2.12.15.a
 
Class thursday 2.4.15.2
Class thursday 2.4.15.2Class thursday 2.4.15.2
Class thursday 2.4.15.2
 
Class 1-29-15
Class  1-29-15Class  1-29-15
Class 1-29-15
 
Class thursday 1.30.14
Class thursday 1.30.14Class thursday 1.30.14
Class thursday 1.30.14
 
Final answers 12.13.13
Final answers 12.13.13Final answers 12.13.13
Final answers 12.13.13
 
Final 12.13.13
Final 12.13.13Final 12.13.13
Final 12.13.13
 
Class 01.24.2013
Class 01.24.2013Class 01.24.2013
Class 01.24.2013
 
Class 12.14.12
Class 12.14.12Class 12.14.12
Class 12.14.12
 
Cl.ass 12.11.12
Cl.ass 12.11.12Cl.ass 12.11.12
Cl.ass 12.11.12
 
Class 11.30.12
Class 11.30.12Class 11.30.12
Class 11.30.12
 
Class 11.27.12
Class 11.27.12Class 11.27.12
Class 11.27.12
 
Class 11.26.12
Class 11.26.12Class 11.26.12
Class 11.26.12
 
Class 11.20.12
Class 11.20.12Class 11.20.12
Class 11.20.12
 
Class 11.19.12
Class 11.19.12Class 11.19.12
Class 11.19.12
 
Homework for 11.19.12
Homework for 11.19.12Homework for 11.19.12
Homework for 11.19.12
 
9th class 11.12.12
9th class 11.12.129th class 11.12.12
9th class 11.12.12
 
10th class 11.13.12
10th class 11.13.1210th class 11.13.12
10th class 11.13.12
 
8th class 11.9.12
8th class 11.9.128th class 11.9.12
8th class 11.9.12
 

Recently uploaded

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

M w f in-class 12.2.11 and homework for 12.5

  • 1.
  • 2. Another key difference between traditional surveillance and electronic surveillance is that employers can monitor workers’ computer use secretly. One popular monitoring method is keystroke logging, which is done by means of an undetectable program on employees’ computers. The Web site of a vendor for Spector Pro, a popular keystroke logging program, explains that the software can be installed to operate in “Stealth” mode so that it “does not show up as an icon, does not appear in the Windows system tray, . . . [and] cannot be uninstalled without the Spector Pro password which YOU specify” (“Automatically”). As Lane explains, these programs record every key entered into the computer in hidden directories that can later be accessed or uploaded by supervisors; the programs can even scan for keywords tailored to individual companies (128-29).
  • 3.
  • 4. Homework for Monday, 12/5 Bring in your Tentative thesis for your paper on the book you’re reading.