how to protect my pc and private IM

Posted on 2007-07-19
Medium Priority
Last Modified: 2010-08-05
I need help to protect my pc in the office. Somehow my IM (Messenger) can be 'read' somewhere by some people most probably network admin. How to protect this? I thought it is secured and not part of network communication. How do they 'read' this? could it be accessing my computer while I am chatting? and get the images of the screen? And if so, how to trap them and get some proof?

Question by:johndenny
  • 4
  • 2
LVL 51

Expert Comment

by:Keith Alabaster
ID: 19529037
Many IM services log their chats to the local hard disk - if yours is doing this, they can simply read the file. Turn off the IM logging functions and 'keep a history' options.

You won't be able to 'trap' them. What you could do is actually ask your system admins to check it for you. If it someone else reading your files, the sys admin should be able to identify accesses made to your machine. if it is the admins themsselves messing about, the fact that you have reported it and asked questions may be enough to stop them.

Author Comment

ID: 19529052
I have turned off the 'keep history' option in the IM. But it is still occurring.
Any other idea? I meant for me this is challenging to find how they do that and how to protect this.
Could it be their watching my pc remotely using admin account? Is this possible? and how to protect?
LVL 51

Accepted Solution

Keith Alabaster earned 750 total points
ID: 19529068
Yes, its possible. Is it likely... who knows.

Drop out to a cmd prompt (start - run - cmd)
netstat -an -- return key
Dou you see ports such as 3389 or 5900 listed in the output?  3389 is RDP and 5900 is vnc.

Do you know if your companies uses tools such as dameware?
Free recovery tool for Microsoft Active Directory

Veeam Explorer for Microsoft Active Directory provides fast and reliable object-level recovery for Active Directory from a single-pass, agentless backup or storage snapshot — without the need to restore an entire virtual machine or use third-party tools.

LVL 19

Assisted Solution

by:Andrew Davis
Andrew Davis earned 750 total points
ID: 19529390
Sysadmins/Netadmins are god. We can read your email, we can see everything.
However the truth is we are lazy and really cant be bothered.
If you are breaking company policy then you have no leg to stand on, and should just stop it.
If you are not then you should make managment aware and make it a task of the sysadmin to track the culprit.
If you are the boss then get sysadmin onto the task, and if you are sure they are your problem then get rid of them.

for some light reading have a look at http://www.theregister.co.uk/odds/bofh/ a good funny look at the comical life of a sysadmin. The early ones were better.
LVL 51

Expert Comment

by:Keith Alabaster
ID: 19567195
Anything else you need?
LVL 51

Expert Comment

by:Keith Alabaster
ID: 19777227
Thanks :)
LVL 19

Expert Comment

by:Andrew Davis
ID: 19780828
Thanks for the points.
Looks like i was having a sarcastic day that day.
Oh well, its still correct
Ta ;)

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Measuring Server's processing rate with a simple powershell command. The differences in processing rate also was recorded in different use-cases, when a server in free and busy states.
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question