你有没有信任问题的女朋友?或者当他或她看到你大部分晚上都在你的电脑上聊天时表现得有点偏执的父母?机会是任何与您关系密切且具有一定计算机技能的人都可以监视您的Windows 计算机(Windows computer)。也许他们这样做是出于好意(例如,您的父母希望确保您不访问(access content)不适合您年龄的内容),或者您的女朋友可能嫉妒并认为您在欺骗她。如果有人想监视您的计算机,他们可能会找到一种方法。技术(Technology)发展如此之快,以至于这些天让您的计算机被监视并不是什么不寻常的事情。我们认为,分享一些最常见的可以让他人窥探您的Windows 计算机(Windows computer)的方法对我们来说是个好主意。他们来了:
1. 使用远程桌面共享(desktop sharing)工具进行间谍活动
监视某人计算机的最简单和最简单的方法之一是使用远程桌面工具。我们不是在谈论在所有现代Windows系统中都可以找到的远程桌面连接工具。(Remote Desktop Connection tool)这个工具可以很好地进行间谍活动,但是有一个问题:每当间谍尝试使用远程桌面连接(Remote Desktop Connection)时,您的计算机屏幕就会变成空白,并且您会知道其他人已经连接。
一个想要成为间谍(wannabe spy)的人可以使用第三方工具来允许远程桌面连接,而不会让你知道它。那里有很多这样的程序,其中大多数是出于正当目的而出于善意而开发的。使用UltraVNC 或 RealVNC(UltraVNC or RealVNC)等静默远程桌面工具,简单的Google 或 Bing 搜索(Google or Bing search)将为您提供大量结果。
间谍可以使用这些工具中的任何一个来查看您的桌面、访问您的网络摄像头并查看您所做的一切或打开麦克风并听到您所说的一切。他或她可以访问您计算机上的所有内容。这些应用程序中的大多数都可以设置为从Windows 启动并(Windows and work)作为Windows 服务运行(Windows service),因此每次打开计算机时,间谍都可以在无人看管的情况下访问它。
2. 使用RAT(RATs)进行间谍活动(Remote Administration Tools/Trojans)
使用远程桌面共享(desktop sharing)工具进行间谍活动是可行的,但它主要是新手的经商方式。监视某人计算机的“专业”方式是使用RAT 软件(RAT software)。我们不是在谈论讨厌的啮齿动物,即使它们之间有很多共同特征。RAT 来自远程管理工具(Remote Administration Tools),它指的是专门设计用于允许间谍在没有物理访问权限的情况下控制计算机的软件应用程序。RAT(RATs)是隐藏在用户视野之外的工具,如果它们很好,它们也会从常见的防病毒软件(antivirus software)中隐藏起来。
RAT(RATs)允许间谍从您的屏幕和网络摄像头(screen and webcam)捕获图像,管理(复制、删除、运行)在您的计算机上找到的文件等等。间谍甚至可以将您的硬件超频到破坏的程度,如果这是他或她想要的。
此类桌面应用程序通常以恶意木马恶意软件(horse malware)的形式分发,并且通常被防病毒软件检测到。然而,许多黑客似乎正在使用额外的软件来掩盖它们并欺骗普通的防病毒引擎认为它们是安全的。您可能想知道如何摆脱这种令人讨厌的恶意软件,以防您成为它的牺牲品。答案很简单:使用非常好的反恶意软件(antimalware software),就像我们在安全审查系列中推荐的那样。
资料来源:(Source:) 维基百科(Wikipedia)。
RAT早在 1998 年就已经存在于我们身边,但正是在过去的十年里,它们才越来越受欢迎。有些人使用这些工具来创建“奴隶”列表。“奴隶”是真实的人,他们不知道自己的计算机上有RAT,并且不断被“主人”监视。有专门针对这项业务的整个黑客论坛,“奴隶”甚至以几美元的价格出售。不使用好的防病毒软件并成为(antivirus software)RAT的受害者意味着您甚至不知道自己是奴隶,并且有人随时监视您。
RAT(RATs)变得如此流行,甚至被军事机构使用。一个值得注意的例子是叙利亚政府曾经使用(也许现在仍然是)Blackshades和DarkComet来监视自己的公民。
3. 使用键盘记录器进行间谍活动
另一种常见的间谍方法(spying method)是使用键盘记录器。这些是在后台运行并记录(background and record)您所做的每一次击键的小程序。与远程桌面工具不同,键盘记录器不会让您的间谍看到您所做的事情,也不会让他/她访问您的网络摄像头或计算机的麦克风。然而,它们是捕获文本的最佳方式。我们所说的文本是指一切:一个好的键盘记录器可以捕获您编写的所有内容,从您用于在线帐户的密码到您发送的电子邮件消息或您使用Skype或任何其他聊天服务(chat service)进行的聊天。
您可以在网络上找到大量的键盘记录器,其中许多是免费的。以下是其中一些: Revealer Keylogger Free(Revealer Keylogger Free)、Spyrix Keylogger Free、Blackbox Security Monitor Express 和 DanuSoft Free Keylogger(Blackbox Security Monitor Express and DanuSoft Free Keylogger)。
一旦间谍获得了您的密码,他或她就可以对您的在线帐户进行任何操作。He/she可以阅读您收到的任何电子邮件,甚至可以代表您发送电子邮件。
结论
今天,只要使用正确的工具,任何人都可以监视任何人。一般来说,在计算机和 IT 方面,有无数的程序可以做几乎任何你可能想到的事情,就间谍而言。在本文中,我们只触及了这个主题的表面,并且只展示了用于监视某人的Windows 计算机或设备(Windows computer or device)的最常用工具。如果您知道其他类型的工具和方法,请不要犹豫,在下面的评论中分享它们。
3 Common ways in which your Windows device can be spied upon
Do you havе a girlfriend who has trust issues? Оr a pаrent who aсts a bit paranoid whеn he or she seеs you spending most of your evenings chatting on yоur computer? Thе chancе is that anyone close to you who has some cоmputer skills, can spy on your Windows computer. Maybe they do that with good intentions (fоr example, you parent wants to mаke sure that you don't access content that is not appropriate for your age) or maybe your girlfriend is јealous and thinks уou're cheаting on her. If someone wants to spy on yoυr computer, they will probably find a way to do it. Tеchnology evolvеd so much that having your computer spied upon is not something out of the ordinary these days. We thought it would be a good idea for us to share some of the most common ways in which someone can spy on уour Windows computer. Here they are:
1. Spying with remote desktop sharing tools
One of the easiest and simplest methods of spying on someone's computer is to use remote desktop tools. We're not talking about the Remote Desktop Connection tool found in all modern Windows systems. This tool would do fine for spying, but there is a problem: whenever a spy tried to use Remote Desktop Connection , your computer's screen would go blank and you would know that the other person has connected.
A wannabe spy could use third party tools that allow remote desktop connections while not letting you know about it. There are plenty of such programs out there, most of them being developed with good intentions, for legitimate purposes. A simple Google or Bing search will give you plenty of results with silent remote desktop tools like UltraVNC or RealVNC.
A spy can use any of these tools to watch your desktop, access your webcam and see everything you do or turn on your microphone and hear everything you say. He or she would have access to everything on your computer. Most of these apps can be set to start with Windows and work as a Windows service, so each time you'd open your computer, the spy would gain unattended access to it.
2. Spying with RATs (Remote Administration Tools/Trojans)
Spying with remote desktop sharing tools works, but it's mostly a rookie's way of doing business. The "professional" way of spying on someone's computer is to use RAT software. And we're not talking about the pesky rodents, even if there are lots of common features between them. RAT comes from Remote Administration Tools and it refers to software apps specially designed to allow the spy to control a computer without having physical access to it. RATs are tools that are hidden from the user's view and, if they are good, they are also stealthed from common antivirus software.
RATs allow spies to capture images from your screen and webcam, manage (copy, delete, run) the files found on your computer and so on. A spy can even overclock your hardware to the point of destruction, if that's what he or she wants.
Such desktop apps are usually distributed in the form of malicious trojan horse malware and are usually detected by antiviruses. However, many hackers appear to be using additional software that cloaks them and tricks average antivirus engines into thinking that they are safe. You're probably wondering how to get rid of such nasty malware in case you fall prey to it. The answer is simple: use very good antimalware software like what we recommend in our series of security reviews.
Source: Wikipedia.
RATs have been with us for as early as 1998, but it was the last decade that made them grow in popularity. There are people that use these tools to create lists of "slaves". The "slaves" are real people that don't know that they have a RAT on their computers and are constantly being spied on by the "masters". There are entire hacking forums dedicated to this business and "slaves" are even sold for a few bucks. Not using good antivirus software and falling victim to a RAT means you won't even know that you are being a slave and that someone is watching you whenever he or she wants.
RATs have become so popular that they are even being used by military agencies. A notable example is the Syrian government which used to use (and maybe still is) Blackshades and DarkComet in order to spy on their own citizens.
3 . Spying with keyloggers
Another common spying method is to use keyloggers. These are small programs that run in the background and record every keystroke you make. Unlike remote desktop tools, keyloggers won't let your spy see what you do, nor will they give him/her access to your webcam or your computer's microphone. They are however, the best way to capture text. And by text, we mean everything: a good keylogger can capture everything you write, from the passwords you use for your online accounts to the email messages you send or the chats you make using Skype or any other chat service.
You can find plenty of keyloggers on the web and many of them are free. Here are a few of them: Revealer Keylogger Free, Spyrix Keylogger Free, Blackbox Security Monitor Express and DanuSoft Free Keylogger.
Once the spy has your passwords, he or she can do anything with your online accounts. He/she can read any email messages you received or even send email messages on your behalf.
Conclusion
Today, anyone can spy on anyone, when using the right tools. When it comes to computers and IT in general, there are countless programs that can do almost anything you might think of, in terms of spying. In this article we have only scratched the surface of this subject and revealed only the most common tools for spying on someone's Windows computer or device. If you know other types of tools and methods, don't hesitate to share them in the comments below.