Table of Contents – Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Table of Contents

Cover

Title page

Copyright

Acknowledgments

Authors

Technical Editor

Foreword

Chapter 1: Why Spy?

Introduction to Spying

Pray for Peace, Prepare for War

Ethics of Spying

Spying on Spouses

Spying on Your Children

When You Should Not Spy

Real-World Case Study

Summary

Chapter 2: Spying Basics

Introduction

Goals of Spying

Psychology of Spying

Spying Methodology

Using Overt Monitoring as a Deterrent

Using Covert Spying to Observe Behavior

Demonstration

Case Study: Dangers of Misinterpretation and Distrust

Summary

Chapter 3: Technology Overview: Computer Basics

Introduction

Hardware

Software

Summary

Chapter 4: Network Basics

Introduction

Network Basics

IP Address

Network Traffic

Summary

Chapter 5: Taking Control

Introduction

Cover Your Tracks

Basic Skills

Software You Will Use

Mastering Your Domain

Summary

Chapter 6: Spying on the PC

Introduction

Mission 1: Collect the Basics

Mission 2: Examining the Past

Mission 3: Live for the Present

Mission 4: Prepare for the Future

Mission 5: Look for Hidden Information

Case Study: Expand Your Investigation Beyond the Local Computer

Summary

Chapter 7: Spying on Web Browsing

Introduction

What Is Web Browsing?

What Can You Get from Web Browsing?

Typical Web Browsers

Basic Skills

Collecting Information from Your Target’s Computer

Collecting Information about Your Target from the Network

Summary

Chapter 8: Spying on E-mail

Introduction

Overview of E-mail

Popular E-mail Clients

Web Mail

Collecting E-mail

Case Study: Return to Sender

Summary

Chapter 9: Spying on Chat and Instant Messages

Introduction

What Is Instant Messaging?

Types of Chat and Instant Messaging

Collecting Passwords and Buddy Lists

Collecting Chat and Instant Messages

Impersonation

Summary

Chapter 10: Advanced Techniques

Introduction

Improving Your Skills

Expanding Your Horizons

Summary

Chapter 11: Counterspy: Are You Being Watched?

Introduction

How to Be Sneaky

How to Tell If You Are Being Watched

How to React If You Are a Target

Identifying Who is Spying on You

A Note about Spyware

Case Study: Guilt is for Suckers, Not Spies

Summary

Index