www.wellresearchedreviews.com é seguro?

Site suspeito

Pontuação de segurança do site

42%
A pontuação de segurança do WOT é baseada em nossas avaliações exclusivas de especialistas em tecnologia e comunidade.
Este site é reivindicado?
Não
Avaliações da comunidade
★ 2.5
Algoritmo do WOT
49%
Segurança da Criança
N/A

O que a comunidade diz?

Deixe um comentário

De 1 a 5, que nota você daria a este site?
starempty-star
starempty-star
starempty-star
starempty-star
starempty-star
Compartilhe seus comentários e ajude a comunidadeAs resenhas devem consistir em pelo menos 15 caracteresEscolha as tags que melhor descrevem este site
Malware ou Vírus
Serviço ao cliente insuficiente
Phishing
Scam
Potencialmente ilegal
Enganoso ou antiético
Risco de Privacidade
Suspeito
Ódio, discriminação
Spam
Potencial programa indesejado
Anúncios / Pop-ups
Conteúdo Adulto
Nudez acidental
Macabro ou chocante
Cancelar
Publicar avaliação
2.5
starstarhalf-starempty-starempty-star

Com base em 3 avaliações

Ordenar por:
Recentes
On my recent call, a Well Researched Reviews (WRR) customer service rep offered incomplete and/or seemingly evasive answers to points I raised about its review of WebWatcher (WW)-- 1. WRR gave a glowing review to web activity-monitoring software product WW, placing industry stalwarts like Cybersitter and NetNanny on almost a second-tier of inferior competitors. Yet, WRR used an arbitrary and unsystematic system for its rating-- the equivalent of saying "Take our word for it". Not only do professional software reviewers writing for and/or employed by industry-based publications typically refuse to gush positive (or negative) over any product, but they take pains to explain a systematic basis for their evaluations. In stark contrast, WRR offered a very limited number of arbitrarily-selected points of evaluation, to the exclusion of all others, as a basis for its glowing praise. WRR's one "negative" was to state WW does not run on a Mac computer-- a doubtful negative to most readers using Windows machines. 2. According to the customer service rep, WRR has no affiliation with and gets no subsidy or consideration from publishers of WW. "Nothing I know of," she insisted. Actually, she may have noticed I wanted a definitive answer, not what she claimed to know-- or not know. 3. I specifically asked the same rep certain obvious security questions, and a paraphrased excerpt of the exchange follows-- First, I observed that WRR praised WW for its ability to monitor remotely multiple computers, recording screenshots and every keystroke on the remotely monitored computer. However, since black hats (hackers) also use this technique routinely to steal passwords and bank account numbers via key loggers and other malware, what is placed on the remotely monitored computer-- a keylogger? The rep made no answer. Second, I questioned the WW claim that the WW remote monitor capability is "highly undetectable"-- "http://www.wellresearchedreviews.com/computer-monitoring/WebWatcher.html#features". Specifically, I asked what is to prevent a remotely-monitored computer from detecting WW's key-logger caliber software. Many very capable root-kit and virus detection products are now in use-- indeed, professional security companies may already have distributed a signature to detect characteristic activity and software used by WW. The customer service rep replied WW uses SSL and port 443, essentially a statement that all traffic on this port is "secure" according to the SSL definition-- but in no way offered me a coherent reply to my question about detection by IDS systems used on the remotely-monitored computer. Later, in a second try, the rep said WW uses "exclusions" to modify the IDS system in use-- in effect tinkering with whatever IDS alarm system it recognizes to "blind" it to WW. If this much is true, then two points apply-- (1) WW works only if it senses accurately (and reliably) the IDS system in place on the remotely-monitored computer AND can change the remote system's IDS list of known malware and keylogger signatures-- almost impossible to do with most such systems, since (otherwise) all malware could wave to the IDS guard in the guardshack and shout, "I'm OK!" (2) The use of exclusions means there IS a recognizable signature to WW presence, rendering beside-the-point whether WW admits its monitoring involves actual dropping of keylogger software on the remote machine. 4. Finally, a very serious question-- what if a black hat sold his keylogger software ("XYZ" ) on the open market, claiming it is a "remote monitor", instead of a keylogger? Conveniently for the black hat, all XYZ keylogger functions remain fully intact, and the black hat is actually paid by the buyer for the privilege of introducing the XYZ keylogger to the buyer's own computer, as well as remotely-monitored systems. This is the question every buyer must consider before believing claims of certain software reviewers.
1
They make reviews and recommendation for monitoring and security solutions rated by WOT yellow or red like: WebWatcher, SpectorPro, SpyAgent, NetNanny, CyberSitter, ContentProtect. They try to look like an trustworthy source of security software, but they definitely aren't!
1
Most of the software they recommend is rated yellow or red.... but these guys are rated green? Seems kind of inconsistent to me. Can someone clear this up for everyone? I'd like to know: which is it? Are these guys not trustworthy, or are the sites they recommend trustworthy?
2
Verifique se você foi comprometidoConecte-se com o Google para escanear seu histórico de navegação.
Conecte-se com o Google
Como visto em
Ao fazer login, você concorda com a coleta e o uso de dados conforme descrito em nosso Termos de uso e Política de Privacidade
alternative-placeholder

Sobre o WOT

Analisamos mais de 2 milhões de sites e contamos. O WOT é uma extensão leve projetada para ajudá-lo a navegar com rapidez e segurança. Ele limpará seu navegador, o acelerará e protegerá suas informações privadas.

Este é o seu site?

Reivindique seu site para acessar as ferramentas de negócios da WOT e se conectar com seus clientes.
Reivindique Este Site
Este site usa cookies para análises e personalização. Ao continuar, você concorda com a nossa política de cookies.
Aceitar