On Fri, 20 Feb 2004, Mike Starke wrote: > I have a client that has asked me about the merits of some > spyware. The software he is looking at is called Spector. > > I have a couple questions regarding this type of software > (as opposed to applying it towards hardware): > > 1: How does this software work? > a)Does it require a local installation? > b)Does it monitor traffic (IP) going it & out the firewall/gateway? > > 2: Is it possible to detect whether some (spyware) has been installed locally? Did you go to the Spectorsoft website? They answer all these questions. > Personally, I am amazed at the money spent on this monitoring. I think > you are just trying to prove what you already suspect and know. > Zero tolerance policies, to me, are more effective....and cheaper :-) Things like this are used as proof for dismissing an employee that has violated the company's computer use policy. To avoid messy legal complications, make sure such software is deployed company-wide and that all monitoring is done equally, otherwise an employee could come back and claim that they were singled out. ~M --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change you mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss