Solved

IE explorer history logfile

Posted on 2004-09-17
4
205 Views
Last Modified: 2008-03-06
Hi guys, got another question for you all.
My boss has asked me to find a way to "secretly" record the contents of IE browser history into a text file that can be opened and read.  He wants to be able to track the web browsing of certain employees.  I know the easiest way to do this is just to block restricted sites via the firewall, but not all of the flagged sites are restricted.   I need to find a way to run a program in the background that will write addresses to a log file when they are entered into the search bar.
One way to handle this, and most likely the easiest, is to design my own web browser via the API object, but I dont want to do it this way.  Is there a way to tap into the real IE application and record?
Willing to bump up the points if/when this question becomes more complicated.
0
Comment
Question by:gwosgood
4 Comments
 
LVL 12

Expert Comment

by:Gary Dewrell
ID: 12090180
Hi gwosgood,
This is not exactly what you want but I think you should consider it. We use a proxy server, "Microsoft ISA server" and force all port 80 traffic through that server. It loggs every site visited by any logged in user.

God Bless
0
 
LVL 14

Accepted Solution

by:
aelatik earned 125 total points
ID: 12090660
You don't need to design your own browser for this. What you could do is to design a BHO ( Browser Helper Object ).
It is a DLL that which will be triggered every time a browser ( Internet explorer ) is started and it will give you a handle to that browser.

After that you will be even able to store the contents of the site to a file. Plus the customer won't even notice it.


But i have to agree with 'gdewrell'. The best and easiest way is to use a server ( Proxy or ISA )
0
 
LVL 2

Author Comment

by:gwosgood
ID: 12607880
Not really what i was looking for, but I have to accept something
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Enums (shorthand for ‘enumerations’) are not often used by programmers but they can be quite valuable when they are.  What are they? An Enum is just a type of variable like a string or an Integer, but in this case one that you create that contains…
You can of course define an array to hold data that is of a particular type like an array of Strings to hold customer names or an array of Doubles to hold customer sales, but what do you do if you want to coordinate that data? This article describes…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
Get people started with the process of using Access VBA to control Excel using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Excel. Using automation, an Access application can laun…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now