TekBudda wrote:
> Greg's post about server monitoring got me thinking about another area
> of monitoring...Employee/Spouse/Children Monitoring.
> 
> I have searched this at various times and for the life of me I can never
> seem to find anything in the open source community...or even a piece of
> freeware.
> 
> I am not sure of anyone knows about anything like that that is
> preferably cross-platform (Lin/Mac/Win), stealthy, open source preferred
> but freeware acceptable.
> 
> I don't have a specif need for this right now, but it ha always
> interested me & in my last job we actually used it to get evidence to
> fire someone.  There were other reasons as well..LOL!
> 
> ANyone know of anything?
>
What I do for my clients is block web access (well actually I block all
direct access to the Internet if I can, with specific exceptions as
needed, say for FTP access to a specific host).  Web browsing *must*
therefore proceed via a proxy which I set via group policy.  I use squid
for the proxy and I force authentication (usually against an Active
Directory, but for the home use you can use a variety of other mechanisms).

I use authentication so that I can track a particular user regardless of
the machine they are using.  The downside is that authentication
prevents you from doing transparent proxying.  The upside is that you
can't cheat by going to another computer.

Of course, in the home they can simply connect to a neighbor's weakly or
unprotected wifi.  In a non-corporate setting I am not a big fan
of this sort of monitoring.  I have no plans to really filter the
Internet, of course I do not yet have kids, so the real test is in the
future.  Having spent some time studying children (as part of my
University degree) I believe that they are far more sophisticated than
they are generally credited for.  This is a complex topic and really OT,
but I will say that most of the accepted wisdom is plain wrong.  Ask me
again in 20 years :)

I also strongly do not believe in monitoring one's spouse.  I know that
I certainly have the capability, but it violates her trust.  In my
relationship we have talked about it and this behavior is unacceptable
to either of us.

The other option is to buy some malware.  It is stealthy and probably
impossible to detect.  There are lots of commercial applications to deal
with this, and more than a few metasploit plugins that can accomplish
this task.  I doubt that my children will have the same technological
advantage that I had over my parents, but my parents also lived through
the 60s and 70s as musicians.  Needless to say any technological
advantage I had was obliterated by their practical experience.  It did
not matter what I did "online",  they were there when I needed them here
in the real world.  Just my thoughts.

Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
clug-talk mailing list
[email protected]
http://clug.ca/mailman/listinfo/clug-talk_clug.ca
Mailing List Guidelines (http://clug.ca/ml_guidelines.php)
**Please remove these lines when replying

Reply via email to