Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives

Uncover the Threats Lurking in the Darkness of Your Family's Computer

Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.--Dr. Eric Cole

  • Learn When to Spy and When Not to SpyWould spying on your spouse or child cause more damage than the problem you suspect exists?
  • Translate What Your Children Are Really Saying OnlineKnow what it means when your child types 420, ASL, Cyber, NSA, POS, or S2R.
  • Follow the SLEUTH MethodologyLearn to: Set goals, Layout strategy, Evaluate and Understand risk, Take observations, and Handle the results.
  • Cover Your TracksUse tools and techniques to achieve your objectives without being discovered.
  • Master Spying SoftwareDownload, install, and use free spying applications, including IZArc, WinSpy, and Kaboodle.
  • You Got That with Google?Use Google and the Google Desktop Search tool to scan and classify public records; blogs; online databases; credit reports; phone and address listings; e-mails; IM chats; files; Web caches; and more.
  • One Person's Trash...Use PC Inspector File Recovery to retrieve and restore deleted files.
  • Expand Your SearchGo beyond the PC to uncover information on switched networks, PDAs, cell phones, iPods, and even video game consoles.
  • Know When the Tables Have TurnedDetermine if you are someone else's mark and take steps to protect yourself.
  • Your Solutions Membership Gives You Access to:

    A comprehensive FAQ page that consolidates all of the key points of this book into an easy-to-search Web page

    "From the Author" Forum where the authors post timely updates and links to related sites

    The complete code listings from the book

    Downloadable chapters from these best selling books:

    Google Hacking for Penetration Testers

    Inside the Spam Cartel: Trade Secrets from the Dark Side

    Hacking a Terror Network: The Silent Threat of Covert Channels

    Stealing the Network: How to Own a Continent

(HTML tags aren't allowed.)

No One Cares What You Had for Lunch: 100 Ideas for Your Blog
No One Cares What You Had for Lunch: 100 Ideas for Your Blog
Tired of filling up your blog with boring posts? Take the next step and get inspired to create something unique. Author Margaret Mason shows you the way with this fun collection of inspirational ideas for your blog. Nobody Cares What You Had for Lunch: 100 Ideas for Your Blog is a unique idea-book for bloggers seeking fun, creative inspiration....
Beginning DB2: From Novice to Professional (Expert's Voice)
Beginning DB2: From Novice to Professional (Expert's Voice)
IBM’s DB2 Express Edition is one of the most capable of the free database platforms available in today’s marketplace. In Beginning DB2, author Grant Allen gets you started using DB2 Express Edition for web sites, desktop applications, and more. The author covers the basics of DB2 for developers and database...
Complete Java 2 Certification Study Guide (3rd Edition)
Complete Java 2 Certification Study Guide (3rd Edition)
Here's the book you need to prepare for the Programmer's and Developer's exams. This Study Guide provides:

In-depth coverage of every exam objective for the revised Programmer's Exam for J2SE 1.4 Hundreds of challenging practice questions, in the book and on the CD Leading-edge exam preparation software

Authoritative coverage of all...

Programming ColdFusion
Programming ColdFusion

ColdFusion is a powerful platform for creating and deploying dynamic web applications. Developers like ColdFusion because its simple, tag-based language makes it easy to handle simple tasks, like processing form data and querying databases. ColdFusion is easy to learn, yet powerful enough to deliver highly scalable, robust...

Foundations Of Decision-Making Agents: Logic, Probability and Modality
Foundations Of Decision-Making Agents: Logic, Probability and Modality

This self-contained book provides three fundamental and generic approaches (logical, probabilistic, and modal) to representing and reasoning with agent epistemic states, specifically in the context of decision making. Each of these approaches can be applied to the construction of intelligent software agents for making decisions, thereby...

Applied Data Mining: Statistical Methods for Business and Industry
Applied Data Mining: Statistical Methods for Business and Industry

"…a book with many nice features that has elements of interest for …every subset of the intended audience…"
 (Journal of the American Statistical Association, September 2006)

"The author's style is consistently readable. Stripping out all but the barest essential...

©2019 LearnIT (support@pdfchm.net) - Privacy Policy