Main Menu
Contact Us

Child Control Surveillance Information

Name: Child Control
Category: Surveillance
Advice: Remove
Risk: High Risk High risk threats typically are remotely exploitable vulnerabilities, which can lead to system compromise. Successful exploitation does not normally require any interaction. May open up communication ports, use polymorphic tactics, stealth installations, and/or anti-spy counter measures. May use a security flaw in the operating system to gain access to your computer.
Description: It is a survelliance tool , which keeps monitoring every activity on your computer.

Child Control is a survelliance tool , which keeps monitoring every activity done by you on the internet and send your activity to the remote user via email.

Signatures: process: CtlSys.exe: MD5 Hash: ff23b1b8f4925926994... process: SysCtl.exe: MD5 Hash: ff23b1b8f4925926994... process: chico2~1.exe: MD5 Hash: ... process: chico2004.exe: MD5 Hash: ... process: chico2004.exe: MD5 Hash: ..
Type: Surveillance - Spyware's primary purpose is to collect demographic and usage information from your computer, usually for advertising purposes. Spyware usually that 'sneaks' onto a system or performs other activities hidden to the user. Spyware programs are usually bundled as a hidden component and downloaded from the Internet. These modules are almost always installed on the system secretively and try to run secretively as well.

Top Surveillance Visited Pages:
Screen Spy1.1 - 491 visits
PC Pandora - 111 visits
Ardamax Keylogger Lite 1.2 - 111 visits
All-In-One Spy 2.0 - 94 visits
Child Control - 94 visits
PCAnywhere PassView v1.11 - 93 visits
e-Surveiller 1.6 - 83 visits
Salus - 81 visits
Srv.SSA-KeyLogger - Alias: W32/Dumaru - 77 visits
Give Me Too v2.30 - 77 visits

Random Surveillance Pages:
Net Monitor for Employees 2.2.2
IamBigBrother 9.1
ReJump Time Tracker
123 PC Spy
Spy Software 4 Parents 8.7
Activity Monitor version 3.8
Guardian Monitor Classic 9.75
XPCSpy Pro 2.25


2006-2008 - Privacy Policy