Solved

How people spy on your network activities?

Posted on 2002-06-24
3
231 Views
Last Modified: 2010-04-11
Hi...

I've been downloading some MP3s on the internet.
Recently, my superior has issued a warning to all employees saying that we should not download mp3s using the company's network. I was just wondering as to how they found out what i was downloading and which site i had visited on my PC?

As far as i know, i'm not accessing the internet through a proxy server ( I do not have any proxy settings on my IE ) I'm not a network person, could anyone care to explain abit?

just being curious..
0
Comment
Question by:osiruz
3 Comments
 
LVL 3

Accepted Solution

by:
cincin77 earned 50 total points
ID: 7103282
Your network should be behind a firewall which has a log file that holds all connections passing trough it.
0
 

Expert Comment

by:mjnsharpe
ID: 7103410
Osirus,

You don't need to be using a proxy server. It is possible to log which websites are being viewed at the firewall level (depending on the firewall).

Of course, your supervisor might have just seen you with your headphones on and assumed you were downloading music! :)

Mat
0
 
LVL 79

Expert Comment

by:lrmoore
ID: 7103749
There are several ways to watch what employees do on the Internet. Just remember, big brother is out there and you should not expect privacy while using company equipement and company bandwidth. Bandwidth hogs cost a company money and it is something that must be controlled and monitored.
0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article, I am going to show you how to simulate a multi-site Lab environment on a single Hyper-V host. I use this method successfully in my own lab to simulate three fully routed global AD Sites on a Windows 10 Hyper-V host.
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

856 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question