Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Questions Regarding Security Implications of Products Like WebWatcher

Posted on 2007-11-28
1
Medium Priority
?
1,025 Views
Last Modified: 2013-12-04
I am reasearching a product to protect my 9-year-old son from adult content on the Internet.  From my research it appears that WebWatcher is one of the best. I am also a network administrator and the capability of a product like WebWatcher is quite scary from a corporate point of view.  After it is installed on a PC it is essentially invisible. Nothing visible in the registry, nothing in the directory structure, and nothing in Add/Remove Programs.  Further, it specifically says no known antivirus product will detect its existence. I have confirmed that data is sent out from the monitored PC via port 80 (the same port a browser typically uses) and similarly the monitoring PC needs only port 80 as well.  Therefore it is unlikely a firewall will block this program.  Do you know if this program installs as a root kit? Do you know if there is anyway for a company to know if such a product is installed anywhere in the organization? Thank you.
0
Comment
Question by:ADougherty234
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 3

Accepted Solution

by:
top_gizmo earned 2000 total points
ID: 20370721
I have purchased webwatcher for home use and it is a great product.  It is hard to detect, but here is a short article.

The reader executed a system scan using Spy Sweeper, which then caught and quarantined Ultraview Plus, a powerful surveillance program developed by Awareness Technologies (www.awarenesstech.com/general; the software is now called WebWatcher, but Spy Sweeper still identifies it as Ultraview Plus).

http://www.smartcomputing.com/editorial/article.asp?article=articles%2F2006%2Fs1708%2F12s08%2F12s08.asp

0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Check out the latest tech news, community articles, and expert highlights in August's newsletter.
If you're a modern-day technology professional, you may be wondering if certifications are really necessary. They are. Here's why.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question