Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

Monitoring internet surfing

Posted on 2003-02-23
8
Medium Priority
?
391 Views
Last Modified: 2010-04-11
I was wondering if there are any programs that would allow me to monitor internet surfing over my LAN.  There are two computers on the LAN, mine is a PC running XP and the other is a Mac running OS 9.2.  Is there a program that enables me to view the internet sites viewed on the Apple computer?

Other information:
Router: D-Link DI-614+

It would also be nice if the program was shareware!
0
Comment
Question by:bvolb2002
7 Comments
 

Accepted Solution

by:
Louis12345 earned 100 total points
ID: 8006590
I unfamiliar with the apple O/S but I do know that it is usually possible to view the browser cache/history of the computer in question. On a windows network when I note surfing anomalies such as naughty sites etc, which I note in the firewall logs I share the root (C:\) of the users hard drive, accessable only to administrator and browse through the browser cache directory of the identified user.
0
 
LVL 1

Assisted Solution

by:batkung
batkung earned 100 total points
ID: 8006792
you could put a proxy into the equation and have the mac access the web through your proxy.

or you could run snort on your xp machine and then analyse the logs that snort generates.
0
 
LVL 8

Assisted Solution

by:ViRoy
ViRoy earned 100 total points
ID: 8013895
see if there is a verbose logging method on the router...
if you can log all access, it should list the LAN IP it came from.

otherwise you would need all data to go through a central computer just like how everyone goues through the router now... and filter that activity into log files.
0
What does it mean to be "Always On"?

Is your cloud always on? With an Always On cloud you won't have to worry about downtime for maintenance or software application code updates, ensuring that your bottom line isn't affected.

 
LVL 1

Expert Comment

by:nisheed
ID: 8018544
Try Network Probe 0.4(it's free) for (Windows NT/2K/XP) goto
http://www.network-monitor.net/

This should do the trick.
 
0
 
LVL 24

Expert Comment

by:SunBow
ID: 8018929
I think you should spend less time snooping, and use more time for shoring up servers and workstations and applying all upgrades and patches.

And don't neglect that web browsers commonly maintain history files, and that they'll cache what is viewed.

Heed that anyone with physical access can modify parameters to become increasingly anonymous, and cloaking can cloud.
0
 
LVL 8

Expert Comment

by:ViRoy
ID: 8019877

a very well organized packet sniffer would show all this as well
0
 
LVL 5

Expert Comment

by:zenlion420
ID: 9872299
No comment has been added lately, so it's time to clean up this TA.
I will leave the following recommendation for this question in the Cleanup topic area:

Split: Louis12345 {http:#8006590} & batkung {http:#8006792} & ViRoy {http:#8013895}

Please leave any comments here within the next seven days.
PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

zenlion420
EE Page Editor
0

Featured Post

Managing Security Policy in a Changing Environment

The enterprise network environment is evolving rapidly as companies extend their physical data centers to embrace cloud computing and software-defined networking. This new reality means that the challenge of managing the security policy is much more dynamic and complex.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question