This book serves as an excellent introduction to spying and counterspying on computers.
The vast majority of the techniques described in the book, however, require what the authors honestly refer to as "intimate access" to the machine of potential interest. Some of the techniques described require the installation of additional hardware (keystroke loggers) or software in order to accomplish the task at hand.
If such access cannot be obtained, much of what is in this book is useless.
But, in cases where it is necessary to "spy" on a family member, such as a spouse or child, this book may be for you.
Interestingly, the last section of the book contains a detailed discussion of countermeasures applicable to many of the techniques appearing in the rest of the book!
No comments:
Post a Comment