Thanks for some input. I would like to hear and see examples of communications (emails, chats, voice over internet protocol (VOIP), and/or instant messaging) obtained with any of the computer monitoring software listed on the site you referred since it is the same site I started my review.
You state the software "would normally be installed from the developer's site" which means it has to be downloaded by the victim's computer without the victim's knowledge?
Exactly, I was surprised after all the money spent on Symantec, Norton, etc. that these malware identification programs could not notify a user that someone had installed spyware on their computer probably via a USB port and everyday the software was sending information about their computer activity to some site that only the third party spier could access since they paid the software developer. The above limitations of malware detection software is a whole other problem. The above realization leads to the next question of how are victims determining they have had computer monitoring software installed on their computer? I still cannot determine if the computer monitoring software stores communications on a victim's computer that a third party can access via a USB port when the victim leaves?
Good idea to disable Autorun, but I can not determine if this will disable the use of zip drives, external drives, etc?
Edited by Steve37, 29 April 2012 - 06:35 PM.