Results 1 to 5 of 5
  1. #1
    Keyloggers/Internet monitoring systems?

    Member Since
    Nov 29, 2007
    Posts
    2
    Keyloggers/Internet monitoring systems?
    At work, I tend to plug in my laptop and share the regular internet connection with it. In my paranoia, I started wondering whether or not it was possible for someone to monitor my internet activity (IMs, e-mails sent, things like that), with the computer plugged in in this way.

    Can anyone explain to me if/how that's possible, or how I can get around it?

  2. #2
    Keyloggers/Internet monitoring systems?
    PerryLynch's Avatar
    Member Since
    Sep 24, 2007
    Posts
    235
    Specs:
    17" MacBook Pro 4GB
    It's very possible for them to monitor all traffic coming in and out of the office network. And with the appropriate tools in place, it may be very easy for them to track unauthorized equipment to the network jack, and from their, show up at your desk. Of course, this does depend on their being an adequate budget for IT Security and skilled enforcement people.

    That being said, I'm going to suggest that your best bet is to read the employee handbook and the information security policy before you do anything. Keep in mind that in most companies, deliberately violating security policy, and more importantly, deliberately bypassing security mechanisms, is most likely a one-way ticket to the unemployment office.

    That being said, I know how to do it and I'm not going to tell you ;-)
    Google is your friend, but be aware of the consequences.

    Good luck with that,
    Perry M Lynch, CISSP CISA, Information Security Consultant
    Perry M Lynch, CISSP CISA
    Mac Newbie, Security not-so-newbie

  3. #3
    Keyloggers/Internet monitoring systems?

    Member Since
    Nov 29, 2007
    Posts
    2
    With keyloggers, how would it work? Does the program, if it's originally installed on computer A, and then a shared network is set up on computer B, would the program then log everything that happened, keystroke-wise, or just programs used?

  4. #4
    Keyloggers/Internet monitoring systems?
    D3v1L80Y's Avatar
    Member Since
    Feb 02, 2004
    Location
    PA
    Posts
    12,456
    Specs:
    MacBook
    Quote Originally Posted by PerryLynch View Post
    It's very possible for them to monitor all traffic coming in and out of the office network. And with the appropriate tools in place, it may be very easy for them to track unauthorized equipment to the network jack, and from their, show up at your desk. Of course, this does depend on their being an adequate budget for IT Security and skilled enforcement people.

    That being said, I'm going to suggest that your best bet is to read the employee handbook and the information security policy before you do anything. Keep in mind that in most companies, deliberately violating security policy, and more importantly, deliberately bypassing security mechanisms, is most likely a one-way ticket to the unemployment office.

    That being said, I know how to do it and I'm not going to tell you ;-)
    Google is your friend, but be aware of the consequences.

    Good luck with that,
    Perry M Lynch, CISSP CISA, Information Security Consultant
    Couldn't have said it better myself.


    Quote Originally Posted by hydrocodone View Post
    With keyloggers, how would it work? Does the program, if it's originally installed on computer A, and then a shared network is set up on computer B, would the program then log everything that happened, keystroke-wise, or just programs used?
    Don't worry about how they work, just don't do anything you're not supposed to do and you won't have anything to worry about.
    Besides, nobody on this forum is going to assist you with bypassing your employer's security measures.
    __________________________________________________
    Posting and YOU|Forum Community Guidelines|The Apple Product Cycle|Forum Courtesy

    mac: a waterproof raincoat made of rubberized fabric
    MAC: a data communication protocol sub-layer, also known as the Media Access Control
    Mac: a brand name which covers several lines of personal computers designed, developed, and marketed by Apple Inc.


  5. #5
    Keyloggers/Internet monitoring systems?
    rman's Avatar
    Member Since
    Dec 24, 2002
    Location
    Los Angeles, California
    Posts
    12,584
    Specs:
    2 x 3.0GHz Quad-Core, 6GB OS X 10.6.8 | 15in MacBook Pro 2.2GHz OS X 10.6.8 | 64GB iPad 2 WiFi
    Cool
    If your security person is monitoring the network traffic. There is nothing you can do, but abide by the company policies.
    Life isn't about waiting for the storm to pass, It's about learning to dance in the rain!

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Similar Threads

  1. Replies: 6
    Last Post: 03-22-2012, 01:14 PM
  2. Internet Speed Monitoring App?
    By Quantum3 in forum Switcher Hangout
    Replies: 15
    Last Post: 02-26-2011, 01:05 PM
  3. Prevent monitoring of internet traffic
    By mhmmhello in forum OS X - Apps and Games
    Replies: 1
    Last Post: 08-04-2009, 11:44 AM
  4. Any Keyloggers able to retrieve past keystrokes?
    By appledapples in forum OS X - Apps and Games
    Replies: 2
    Last Post: 04-16-2009, 08:08 AM
  5. Allume Systems (formerly Alladin Systems) discounts
    By rberry88 in forum Running Windows (or anything else) on your Mac
    Replies: 0
    Last Post: 07-27-2004, 07:46 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •