Chris
On 7/12/06, Rion D'Luz <[EMAIL PROTECTED]> wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hello all:
Any opinion on the best way to monitor the file transfers and|or
general activities ofa user w/out going to the extreme of keylogging etc.?
What is|are the most effective and|or least intrusive options?
For instance:
joedokes works for acme.widget and has auth access to sensitive
information, both in file and db format; each accessed remotely from servers
as such. What can be done to insure that if joe decides to x-fer the
company jewels to his local machine that it is audited and can be used
as proof?
TIA
RIon
- --
Beware when truth is called treason
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFEtYyj94WPEVwn1ncRAhboAJ9Hi3Z2QsWaVFMiAZm4BK9sd5xT0QCgh88/
zBGY+mcVMvdFxF1TZjoEcC8=
=MqUR
-----END PGP SIGNATURE-----
--
Chris
www.chrisadams.org
www.linuxchris.com
AOL and Yahoo IM - fan0of0as
MSN Messenger - [EMAIL PROTECTED]
