WebWatcher PC Monitoring Software Questions

  • Posted by a hidden member.
    Log in to view his profile

    Nov 05, 2007 7:10 PM GMT
    Okay, calling all geeks, calling all geeks....

    Has anyone ever used a PC Monitoring Software before and did it work as advertised? Just wondering. I have read up on WebWatcher but it sounds almost too powerful. Also, if someone installed this on your computer how could you find out if it is there if the thing runs in stealth mode and does not show up in the Task Manager? I have heard even virus protection and spy-ware detection software can't find them. icon_question.gif
  • auryn

    Posts: 2061

    Nov 05, 2007 11:14 PM GMT
    If you don't get an answer here, go to www.gaygamer.net and ask the same question.icon_idea.gif
  • Posted by a hidden member.
    Log in to view his profile

    Nov 06, 2007 2:30 PM GMT
    {shrugs} I'm sure it will do exactly as advertised. In my opinion, yes they are too powerful--although by 'too powerful' I mean they record and pry too much, not that they're too hard to defeat. If you want to use one, remember there's a whole host of ways to defeat it, and a whole host of ways to find out one's on your computer, so just be careful that whoever's computer is the target is not very tech-savvy or they will not only find out about, they'll get around or out-and-out destroy it.

    I know I did when I was younger and my parents tried installing filtering software on my computer. Took me about ten minutes to trash it. Then they got pissed. I still think they're the only ones who were in the wrong there.

    As for how you can find them...although I've never used one, anyone who has knows how to find it. After all, after you install it, if you can't get the data on what that person is watching by finding and retrieving it from the monitoring program, what good is it doing you?

    You can always try browsing through the folders of your computer looking for brandnames you've never heard of, or even a folder or file called "WebWatcher Parental Control Software." Sometimes it really is that easy. But if you don't see anything that doesn't look familiar or like you've seen it before:

    Auryn's site will probably help--someone there may have encountered this specific program and know where in the computer's memory it goes so that you can check there. That I think is probably your best bet. OR you could just buy it yourself and try installing it on your own computer. Take notes during the installation process, see exactly where it installs to, see exactly how it works, and then look to see if you're computer is exhibiting those behaviors.

    If you think the computer is being monitored remotely, and none of the above has worked, get a packet sniffer (plenty available for free; message me about it if you can't find one). At some point the program is going to have to send data to the other computer, and a packet sniffer will monitor everything going out from your computer--so if you are sending out data to addresses you've never heard of, you've got a problem (only drawback to this is that you have to be able to use and understand a packet sniffer).

    And if none of these work, call in the neighborhood fifteen year old genius, because a.) we're getting near the edge of my experience and b.) it's too hard for me to describe the rest of the techniques in anything less than an essay.
  • Posted by a hidden member.
    Log in to view his profile

    Nov 06, 2007 3:58 PM GMT
    Yes, I use monitoring software all the time. Yes they usually work as advertised with regards to kids, the commercial software has come a long way in the last 10 years.

    Some of the packages are well hidden.

    Kids are bright and intuitive, and can find a way around almost anything they know is there; just for fun. So software Mfg's make it tougher for the average computer literate teenager to bypass.

    It is almost impossible to ensure totally guaranteed transparency without spending a lot more than most people are willing to fork out; but the commercial stuff does pretty well these days.


    coutercultured makes good points.


  • Posted by a hidden member.
    Log in to view his profile

    Nov 06, 2007 4:11 PM GMT
    For all their sophistication and stealth, it's easy enough to bypass such programs by booting to a bootable Linux CD.