Solved

Can someone intercept chat messages on msn?

Posted on 2004-09-10
5
2,183 Views
Last Modified: 2008-01-09
Can someone intercept or view messages that are going back and forth during an msn chat? can someone give me a brief overview or summary on security issues relating to exchange of data using internet applications such as emal, msn? do i need to use encryption software?

Thank you
0
Comment
Question by:elikhater
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
5 Comments
 
LVL 10

Expert Comment

by:dis1931
ID: 12032567
It depends...for example on a network it is possible.  If you have wireless a person can sniff packets and read in plain text what you write.  On a regular lan they can sniff packets if you use a hub or if they have access to outgoing traffic through some kind of proxy server, etc...Really depends on network topology.  Encryption is good if you are concerned about traffic being stolen or if you are wary of those on your LAN.

Dis
0
 
LVL 6

Expert Comment

by:icemanwol
ID: 12033059
Anouther security issue could be a keylogger on the system you are useing or the other system.  
0
 
LVL 10

Expert Comment

by:dis1931
ID: 12033109
Yes definitely a concern...even encryption won't solve this....keyloggers can be installed by spyware...or trojans..or by someone trying to eavesdrop....just know what you have running and don't give people access to your PC especially under an admin profile...

Dis
0
 

Author Comment

by:elikhater
ID: 12033314
Thank you dis1931 and icemanwol. How do I know if keylogger is running? and what exactly do you mean by "just know what you have running". Thanks for the advice so far.
0
 
LVL 10

Accepted Solution

by:
dis1931 earned 500 total points
ID: 12033391
You can use spybot and ad-aware to scan for spyware and ad-ware....popups and some other nasty things.  Virus programs are good to run...Check your Add/Remove programs to make sure no one has installed any unwanted software.  Check your Start menu --> Programs --> startup to make sure there are no unwanted programs.  There are startup registry keys under....

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

and

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run

you can get to those by using regedit....

Spybot and AD-aware scan those as well as many other known apps.  I would say check task manager by pressing ALT-CTRL-DEL and then click task manager and look under processes.  Get familiar with what is under there and if you don't know what something is you can look it up on google and find out what applications you have running and what they do and if you really want them to run.  If you notice things in here that you don't recognie then possibly you have gotten some kind of software installed unknowningly.

0

Featured Post

Major Incident Management Communications

Major incidents and IT service outages cost companies millions. Often the solution to minimizing damage is automated communication. Find out more in our Major Incident Management Communications infographic.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question