Category: 

What are the Different Types of Tracking Software?

Article Details
  • Written By: C. Mitchell
  • Edited By: John Allen
  • Last Modified Date: 23 September 2016
  • Copyright Protected:
    2003-2016
    Conjecture Corporation
  • Print this Article
Free Widgets for your Site/Blog
Roughly one-fifth of the world's stock of gold - worth over $200 billion USD - is stored under the streets of London.  more...

September 30 ,  1949 :  The Berlin Air Lift ended.  more...

Tracking software — that is, software that is installed onto a device to relay back information about that device’s location or history — is becoming increasingly advanced as technology develops. The first tracking software programs were designed to monitor individual Internet access, keeping a log of sites visited and time spent online. These sorts of software programs remain popular, but Internet history is no longer the only kind of tracking that is done. Content-tracking programs keep logs of keystrokes and can record substantive entries into web sites and applications, for instance. On mobile devices, the software can be used to track, among other things, location, movement, and motion.

Most tracking software is Internet-based, which means that it operates either over or through an online Web browser. Internet protocol, or IP, tracking software is the most straightforward example. When a computer connects to the Internet, it is assigned a temporary IP address, typically composed of numbers, that serves as that computer’s online identifier. An IP tracking program installed on the computer will monitor where that address is seen online, and will track all web use patterns associated with it.

Time tracking software works similarly. Usually, time tracking monitors the amount of time a specific user spends online, and how much time that user spends on any given site. User-based tracking is usually done based on log-in identification, rather than IP identification.

Ad

IP tracking programs can either be intentionally installed on a computer by someone like a parent or a spouse, or they can be surreptitiously downloaded from a web site, usually without the computer user’s knowledge or consent. Surreptitious downloads are generally designed to capture sensitive information users may type into the Internet, such as e-mail passwords or bank account information. Most jurisdictions have strict laws prohibiting the download of any tracking software without the computer owner’s direct consent. These laws can be hard to enforce when the downloads may not be noticed until serious damage has been done, however.

Computer owners may also elect to install tracking programs onto portable computer equipment that is designed to track physical location in case of loss or theft. In this case, the software lies dormant on a computer until the device is reported missing; then, the software is remotely activated, and can provide immediate location tracking. This kind of tracking capability is popular among corporations who issue laptops and palm computers to employees, particularly when those who deal with sensitive personal or financial information. Most location tracking software is based on GPS tracking software technology, which means that the device does not have to be connected to the Internet or even turned on in most instances in order for tracking to work.

GPS tracking programs are also popular in cell phones and other portable technological devices. Most smart phones come equipped with optional motion tracking software, but in many jurisdictions this software can only be activated by emergency personnel, such as police or medical teams, in case of crisis. Still, some commercially-available programs and applications allow phone users to download tracking programs that can either keep track of the phone’s location in space, or monitor its usage, including numbers dialed, text messages sent, and websites visited.

Ad

You might also Like

Recommended

Discuss this Article

Post your comments

exception 'Exception' with message 'error writing captcha: Duplicate entry '2147483647' for key 'PRIMARY'' in /ssd/www/wisegeek/public_html/_core/classes/public/Captcha.php:44
Stack trace:
#0 /ssd/www/wisegeek/public_html/_core/controls/public/ControlDiscussionPostBox.php(324): Captcha->createCaptcha()
#1 /ssd/www/wisegeek/public_html/framework/classes/Control.php(104): ControlDiscussionPostBox->preRender(false)
#2 /ssd/www/wisegeek/public_html/framework/classes/Control.php(149): Control->render()
#3 /ssd/www/wisegeek/public_html/tpl/default-nocustom-lu/pages/public/article/article.htm(526): Control->__toString()
#4 /ssd/www/wisegeek/public_html/framework/classes/Control.php(300): require('/ssd/www/wisege...')
#5 /ssd/www/wisegeek/public_html/framework/classes/Control.php(309): Control->requireTpl('pages/public/ar...', Object(PageArticleCom), true)
#6 /ssd/www/wisegeek/public_html/framework/classes/Control.php(131): Control->renderTpl('pages/public/ar...', Object(PageArticleCom))
#7 /ssd/www/wisegeek/public_html/framework/classes/FormDataControl.php(87): Control->renderTemplate()
#8 /ssd/www/wisegeek/public_html/framework/classes/Control.php(109): FormDataControl->renderTemplate()
#9 /ssd/www/wisegeek/public_html/framework/classes/ScriptPage.php(50): Control->render(false)
#10 /ssd/www/wisegeek/public_html/framework/classes/Control.php(149): ScriptPage->render()
#11 /ssd/www/wisegeek/public_html/framework/classes/Page.php(97): Control->__toString()
#12 /ssd/www/wisegeek/public_html/_core/classes/public/PublicFrontController.php(443): Page->processRequest()
#13 /ssd/www/wisegeek/public_html/_core/classes/public/PublicFrontController.php(7): PublicFrontController->renderPage()
#14 /ssd/www/wisegeek/public_html/index.php(11): PublicFrontController::run()
#15 {main}