New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 990
Comments: 20
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
Computer Cops: Surveillance

Search on This Topic:   
[ Go to Home | Select a New Topic ]

image New Technology\Prods: Fortress Debut (Beta 1) image
Surveillance
Paul writes "Fortress is a unique application that provides a multi-faceted approach to security and alert notifications. Fortress is a live work in progress and will be updated when milestones are met, and if any patches are released. "
Posted by phoenix22  on Wednesday, 28 April 2004 @ 18:06:52 EDT (429 reads)
(» Read More... | 868 bytes more | TrackBack (0) | comments? | New Technology\Prods | Score: 0)
image

image Sniffers: Sniffers, Delete this folder... image
Surveillance
Anonymous writes "All the surveillance in the world isn't doing a lot of good, but it is work. People need to do something and the larger part of equipment , in this networking industry, is the real thing in espionage. If you had been under IP surveillance for a length of time, say two-and-a-half years, you now know that the boss and all other personnel who know that incoming/outgoing traffic is monitored use the services carefully and encrypt all sensitive information. "
Posted by Paul  on Saturday, 10 January 2004 @ 08:19:23 EST (552 reads)
(» Read More... | 1185 bytes more | TrackBack (0) | comments? | Sniffers | Score: 0)
image

image Leery spouses spy on each other online image
Surveillance
Leery spouses spy on each other online

NEW YORK (AP) --Suspicious husbands and wives who once might have hired a private eye to find out if their spouses were cheating are now using do-it-yourself technology to check on an increasingly popular hideaway for trysts -- the Internet.

Divorce lawyers and marriage counselors say Internet-abetted infidelity, romance originating in chat rooms and fueled by e-mails, is now one of the leading factors in marital breakdowns.

With the surge in cyberaffairs, a new market for electronic spying has developed. Web sites such as Chatcheaters.com and InfidelityCheck.org describe an array of surveillance products capable of tracking a cheating spouse's e-mails and online chats, including some that can monitor each key stroke in real time.
Posted by phoenix22  on Sunday, 03 August 2003 @ 07:25:00 EDT (745 reads)
(» Read More... | 4497 bytes more | TrackBack (0) | comments? | Score: 0)
image

image Gov't (U.S.): Judges OK evidence from hacker vigilante image
Surveillance
Judges OK evidence from hacker vigilante
By Lisa M. Bowman
CNET News.com

August 1, 2003, 10:22 AM PT

URL: http://zdnet.com.com/2100-1105-5058835.html

A federal appeals panel ruled this week that the government did not violate search and seizure laws when it used evidence that a hacker gathered to establish a child pornography case.

The opinion reverses a lower court ruling in which a U.S. District Court judge in Virginia suppressed the evidence, saying the government had violated a defendant's rights.

The decision stems from a case in which a hacker uploaded a file to a child porn newsgroup that made it possible to track who downloaded files from the service. The uploaded file contained the SubSeven virus, which the hacker used to remotely search people's computers for porn.
Posted by phoenix22  on Saturday, 02 August 2003 @ 08:30:00 EDT (388 reads)
(» Read More... | 2258 bytes more | TrackBack (0) | comments? | Gov't (U.S.) | Score: 0)
image

image Gov't (U.S.): FBI wants to tap Net phones image
Surveillance
FBI wants to tap Net phones
By Declan McCullagh
CNET News.com
July 29, 2003, 4:00 AM PT
URL: http://zdnet.com.com/2100-1105-5056917.html

Internet telephone calls are fast becoming a national security threat that must be countered with new police wiretap rules, according to an FBI proposal presented quietly to regulators this month.

Representatives of the FBI's Electronic Surveillance Technology Section in Chantilly, Va., have met at least twice in the past three weeks with senior officials of the Federal Communications Commission to lobby for proposed new Internet eavesdropping rules. The FBI-drafted plan seeks to force broadband providers to provide more efficient, standardized surveillance facilities and could substantially change the way that cable modem and DSL (digital subscriber line) companies operate.
Posted by phoenix22  on Tuesday, 29 July 2003 @ 11:01:50 EDT (766 reads)
(» Read More... | 14674 bytes more | TrackBack (0) | comments? | Gov't (U.S.) | Score: 5)
image

image Gov't (U.S.): Senate disconnects computer dragnet funds image
Surveillance
Senate disconnects computer dragnet funds
Reuters
July 18, 2003, 6:38 AM PT
URL: http://zdnet.com.com/2100-1105-1027144.html
WASHINGTON--The U.S. Senate voted Thursday to cut off funding for a widely criticized computer-surveillance program that would comb travel records, credit-card bills and other private records to sniff out suspected terrorists.

In a military spending bill it passed unanimously, the Senate forbade the Defense Department to spend any portion of its $369 billion budget on the Terrorism Information Awareness program, brushing aside a request by the Bush administration to keep development efforts intact.

Posted by phoenix22  on Monday, 21 July 2003 @ 14:54:45 EDT (413 reads)
(» Read More... | 2185 bytes more | TrackBack (0) | comments? | Gov't (U.S.) | Score: 0)
image

image AVP: NOD32 Version 2.0 Released image
Surveillance
06/12/2003
Version 2.0’s Many Enhancements Include New Planner/Scheduler for Customized Scheduling Of Scans and Virus Updates; Email Filter, Quarantine Protocols, GUI Also Improved

Eset Software, a leading provider of internet software security solutions, today announced the commercial release of NOD32 Version 2.0 (EN), a major upgrade of its industry-leading virus detection software. With Version 2.0, Eset has enhanced one of the world’s foremost virus detection products with greater control and flexibility, making it easier than ever for users to manage and detect incoming threats to their computers and computer networks.

Among the many improvements to NOD32 Version 2.0—actually the fourth generation of Eset’s original NOD32 technology—are the following:
Posted by Paul  on Thursday, 12 June 2003 @ 15:31:00 EDT (1179 reads)
(» Read More... | 3073 bytes more | TrackBack (0) | comments? | AVP | Score: 5)
image

image Downloads: FTimes 3.2.1 Intrusion Analysis Tool Released image
Surveillance
FTimes is a system baselining and evidence collection tool. The primary purpose of FTimes is to gather and/or develop information about specified directories and files in a manner conducive to intrusion analysis.

FTimes is a lightweight tool in the sense that it doesn't need to be "installed" on a given system to work on that system, it is small enough to fit on a single floppy, and it provides only a command line interface.
Posted by cj  on Friday, 28 March 2003 @ 06:54:25 EST (554 reads)
(» Read More... | 1488 bytes more | TrackBack (0) | comments? | Downloads | Score: 0)
image

image Global: Employee objects to company's use of digital video surveillance cameras image
Surveillance
"An employee of a railway complained that his employer was collecting the personal information of employees without consent. The complainant was concerned that the digital video recording cameras recently installed at a company yard could collect the personal information of employees, specifically, their conduct and work performance, and that such information could then be used for disciplinary purposes."
Posted by Paul  on Thursday, 27 February 2003 @ 15:28:22 EST (597 reads)
(» Read More... | 1506 bytes more | TrackBack (0) | comments? | Global | Score: 0)
image

image Privacy: GPS devices increasingly are used to spy on people image
Surveillance
By FRANK JAMES
Chicago Tribune

WASHINGTON -- While GPS technology that uses satellites has been a boon to millions who don't want to get lost, others increasingly are turning to the same technology to track people and keep an eye on them.

Spouses who believe mates are having affairs, employers who suspect workers are misusing company vehicles or parents who wonder if their children are where they are supposed to be are among those using devices tied to the global positioning system of satellites.
Posted by Paul  on Thursday, 27 February 2003 @ 15:25:05 EST (1497 reads)
(» Read More... | 1210 bytes more | TrackBack (0) | 1 comment | Privacy | Score: 1)
image

Login
User Login

Nickname:
Password:
Security Code: Security Code
Type Security Code:
 
· New User? ·
Click here to create a registered account.
image
Forums Topics
Syndication