Solved

Questions Regarding Security Implications of Products Like WebWatcher

Posted on 2007-11-28
1
1,024 Views
Last Modified: 2013-12-04
I am reasearching a product to protect my 9-year-old son from adult content on the Internet.  From my research it appears that WebWatcher is one of the best. I am also a network administrator and the capability of a product like WebWatcher is quite scary from a corporate point of view.  After it is installed on a PC it is essentially invisible. Nothing visible in the registry, nothing in the directory structure, and nothing in Add/Remove Programs.  Further, it specifically says no known antivirus product will detect its existence. I have confirmed that data is sent out from the monitored PC via port 80 (the same port a browser typically uses) and similarly the monitoring PC needs only port 80 as well.  Therefore it is unlikely a firewall will block this program.  Do you know if this program installs as a root kit? Do you know if there is anyway for a company to know if such a product is installed anywhere in the organization? Thank you.
0
Comment
Question by:ADougherty234
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 3

Accepted Solution

by:
top_gizmo earned 500 total points
ID: 20370721
I have purchased webwatcher for home use and it is a great product.  It is hard to detect, but here is a short article.

The reader executed a system scan using Spy Sweeper, which then caught and quarantined Ultraview Plus, a powerful surveillance program developed by Awareness Technologies (www.awarenesstech.com/general; the software is now called WebWatcher, but Spy Sweeper still identifies it as Ultraview Plus).

http://www.smartcomputing.com/editorial/article.asp?article=articles%2F2006%2Fs1708%2F12s08%2F12s08.asp

0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the rising number of cyber attacks in recent years, keeping your personal data safe has become more important than ever. The tips outlined in this article will help you keep your identitfy safe.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

615 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question