TekBudda wrote: > Greg's post about server monitoring got me thinking about another area > of monitoring...Employee/Spouse/Children Monitoring. > > I have searched this at various times and for the life of me I can never > seem to find anything in the open source community...or even a piece of > freeware. > > I am not sure of anyone knows about anything like that that is > preferably cross-platform (Lin/Mac/Win), stealthy, open source preferred > but freeware acceptable. > > I don't have a specif need for this right now, but it ha always > interested me & in my last job we actually used it to get evidence to > fire someone. There were other reasons as well..LOL! > > ANyone know of anything? > What I do for my clients is block web access (well actually I block all direct access to the Internet if I can, with specific exceptions as needed, say for FTP access to a specific host). Web browsing *must* therefore proceed via a proxy which I set via group policy. I use squid for the proxy and I force authentication (usually against an Active Directory, but for the home use you can use a variety of other mechanisms).
I use authentication so that I can track a particular user regardless of the machine they are using. The downside is that authentication prevents you from doing transparent proxying. The upside is that you can't cheat by going to another computer. Of course, in the home they can simply connect to a neighbor's weakly or unprotected wifi. In a non-corporate setting I am not a big fan of this sort of monitoring. I have no plans to really filter the Internet, of course I do not yet have kids, so the real test is in the future. Having spent some time studying children (as part of my University degree) I believe that they are far more sophisticated than they are generally credited for. This is a complex topic and really OT, but I will say that most of the accepted wisdom is plain wrong. Ask me again in 20 years :) I also strongly do not believe in monitoring one's spouse. I know that I certainly have the capability, but it violates her trust. In my relationship we have talked about it and this behavior is unacceptable to either of us. The other option is to buy some malware. It is stealthy and probably impossible to detect. There are lots of commercial applications to deal with this, and more than a few metasploit plugins that can accomplish this task. I doubt that my children will have the same technological advantage that I had over my parents, but my parents also lived through the 60s and 70s as musicians. Needless to say any technological advantage I had was obliterated by their practical experience. It did not matter what I did "online", they were there when I needed them here in the real world. Just my thoughts.
signature.asc
Description: OpenPGP digital signature
_______________________________________________ clug-talk mailing list [email protected] http://clug.ca/mailman/listinfo/clug-talk_clug.ca Mailing List Guidelines (http://clug.ca/ml_guidelines.php) **Please remove these lines when replying

