New To Mac-Forums?

Welcome to our community! Join the discussion today by registering your FREE account. If you have any problems with the registration process, please contact us!

Get your questions answered by community gurus Advice and insight from world-class Apple enthusiasts Exclusive access to members-only contests, giveaways and deals

Join today!

 
Start a Discussion
 

Mac-Forums Brief

Subscribe to Mac-Forums Brief to receive special offers from Mac-Forums partners and sponsors

Join the conversation RSS
OS X - Operating System General OS operation information and support

OS 10.4 - Keyloggers/Internet monitoring systems?


Thread Closed

 
Thread Tools
hydrocodone

 
Member Since: Nov 29, 2007
Posts: 2
hydrocodone is on a distinguished road

hydrocodone is offline
At work, I tend to plug in my laptop and share the regular internet connection with it. In my paranoia, I started wondering whether or not it was possible for someone to monitor my internet activity (IMs, e-mails sent, things like that), with the computer plugged in in this way.

Can anyone explain to me if/how that's possible, or how I can get around it?
PerryLynch

 
PerryLynch's Avatar
 
Member Since: Sep 24, 2007
Posts: 235
PerryLynch has a spectacular aura about
Mac Specs: 17" MacBook Pro 4GB

PerryLynch is offline
It's very possible for them to monitor all traffic coming in and out of the office network. And with the appropriate tools in place, it may be very easy for them to track unauthorized equipment to the network jack, and from their, show up at your desk. Of course, this does depend on their being an adequate budget for IT Security and skilled enforcement people.

That being said, I'm going to suggest that your best bet is to read the employee handbook and the information security policy before you do anything. Keep in mind that in most companies, deliberately violating security policy, and more importantly, deliberately bypassing security mechanisms, is most likely a one-way ticket to the unemployment office.

That being said, I know how to do it and I'm not going to tell you ;-)
Google is your friend, but be aware of the consequences.

Good luck with that,
Perry M Lynch, CISSP CISA, Information Security Consultant

Perry M Lynch, CISSP CISA
Mac Newbie, Security not-so-newbie
hydrocodone

 
Member Since: Nov 29, 2007
Posts: 2
hydrocodone is on a distinguished road

hydrocodone is offline
With keyloggers, how would it work? Does the program, if it's originally installed on computer A, and then a shared network is set up on computer B, would the program then log everything that happened, keystroke-wise, or just programs used?
D3v1L80Y

 
D3v1L80Y's Avatar
 
Member Since: Feb 02, 2004
Location: PA
Posts: 12,459
D3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond reputeD3v1L80Y has a reputation beyond repute
Mac Specs: MacBook

D3v1L80Y is offline
Quote:
Originally Posted by PerryLynch View Post
It's very possible for them to monitor all traffic coming in and out of the office network. And with the appropriate tools in place, it may be very easy for them to track unauthorized equipment to the network jack, and from their, show up at your desk. Of course, this does depend on their being an adequate budget for IT Security and skilled enforcement people.

That being said, I'm going to suggest that your best bet is to read the employee handbook and the information security policy before you do anything. Keep in mind that in most companies, deliberately violating security policy, and more importantly, deliberately bypassing security mechanisms, is most likely a one-way ticket to the unemployment office.

That being said, I know how to do it and I'm not going to tell you ;-)
Google is your friend, but be aware of the consequences.

Good luck with that,
Perry M Lynch, CISSP CISA, Information Security Consultant
Couldn't have said it better myself.


Quote:
Originally Posted by hydrocodone View Post
With keyloggers, how would it work? Does the program, if it's originally installed on computer A, and then a shared network is set up on computer B, would the program then log everything that happened, keystroke-wise, or just programs used?
Don't worry about how they work, just don't do anything you're not supposed to do and you won't have anything to worry about.
Besides, nobody on this forum is going to assist you with bypassing your employer's security measures.

__________________________________________________
Posting and YOU|Forum Community Guidelines|The Apple Product Cycle|Forum Courtesy

mac: a waterproof raincoat made of rubberized fabric
MAC: a data communication protocol sub-layer, also known as the Media Access Control
Mac: a brand name which covers several lines of personal computers designed, developed, and marketed by Apple Inc.

rman

 
rman's Avatar
 
Member Since: Dec 24, 2002
Location: Los Angeles, California
Posts: 12,591
rman has much to be proud ofrman has much to be proud ofrman has much to be proud ofrman has much to be proud ofrman has much to be proud ofrman has much to be proud ofrman has much to be proud ofrman has much to be proud ofrman has much to be proud ofrman has much to be proud of
Mac Specs: 2 x 3.0GHz Quad-Core, 6GB OS X 10.6.8 | 15in MacBook Pro 2.2GHz OS X 10.6.8 | 64GB iPad 2 WiFi

rman is offline
If your security person is monitoring the network traffic. There is nothing you can do, but abide by the company policies.

Life isn't about waiting for the storm to pass, It's about learning to dance in the rain!

Thread Closed


« dashcode? | Is there a mouse config »
Thread Tools

Currently Active Users Viewing This Thread: 1 (0 members and 1 guests)
 
Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts
BB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Trackbacks are On
Pingbacks are On
Refbacks are Off
Forum Jump

Similar Threads
Thread
Thread Starter
Forum
Replies
Last Post
Speed of Apple Intel dev systems impress developers jram Apple Rumors and Reports 15 01-12-2006 10:50 PM
Allume Systems (formerly Alladin Systems) discounts rberry88 Running Windows (or anything else) on your Mac 0 07-27-2004 07:46 PM

All times are GMT -4. The time now is 10:49 PM.

Powered by vBulletin
Copyright ©2000 - 2014, Jelsoft Enterprises Ltd.
X

Welcome to Mac-Forums.com

Create your username to jump into the discussion!

New members like you have made this community the ultimate source for your Mac since 2003!


(4 digit year)

Already a member?