Do spyware, rootkits, key loggers, and hypervisors pose a threat to G.A.L.?
Any software that can monitor your activity that is installed under G.A.L. is to be AVOIDED! That is why we insist on open source software and frequent security updates. It is ALWAYS a good idea to check the security bulletins for issues related to G.A.L. There is no known spyware that installs under G.A.L. on the sly but that can always change. If you install a package that performs spying and key logging, this will compromise your privacy. If you “invite” a closed source application into your work environment, the potential for compromise increases. There has been at least one company that offer services such as a search tool bar for your browser (under MS Windows but NOT G.A.L.), that when installed TAKES YOUR OUTLOOK ADDRESS BOOK, SENDS IT TO SPONSERING COMPANY AND THEY PUT THE DATA INTO A DATABASE- WHICH THEY SELL! This is BAD BAD BAD EVIL BAD!!! Education and notification are extremely important tools that help lessen privacy compromise in these instances. Be warned, if you insta