Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


internet monitoring

Posted on 2007-10-15
Medium Priority
Last Modified: 2013-11-24
I heard there are programs that you can remotely monitor internet traffic and see what people are using around you or more importantly see if someone is monitoring your (my) internet use. What are some programs out. I have a guy at work that I think has been monitoring my usage and  I lock my laptop so im sure he has not had physical access to my laptop.
Its a mac os.
Question by:oriontala1
LVL 70

Expert Comment

ID: 20083399
Hi oriontala1,  the one I use  and  that may assist you in monitoring your own system.
Active Ports
This program enables you to monitor all open TCP/IP and UDP ports on a local computer.
Whenever anyone access your ip address it flashed red, you can then highlight this Quiry Names
it will show the remote address and local address.
you then have the choice to terminate the process.
LVL 32

Accepted Solution

r-k earned 1000 total points
ID: 20083410
Assuming he has no direct access to your laptop (and has not guessed your password), about all he could do is to monitor your network traffic. How easily he can do this depends on what type of network you're sharing. For example, if you are both on a shared hub then he could monitor all traffic to/from your computer by using a network sniffing program like wireshark (formerly etherreal) http://www.wireshark.org/ though it may be impratical to monitor ALL traffic, he could monitor enough.

On the other hand if you are on a switched network then it would not be so easy, and he would need admin access to the switch to do any monitoring.

How can you detect if someone is monitoring your usage. For the most part you cannot, because once traffic leaves your laptop it is out of your control, and not easy to detect who may be monitoring it. You can of course limit what you put on the network, and you can also review your network topology to see if it is shared or switched, and who has access, etc.


Expert Comment

ID: 20295994
Forced accept.

EE Admin

Featured Post

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
The recent Petya-like ransomware attack served a big blow to hundreds of banks, corporations and government offices The Acronis blog takes a closer look at this damaging worm to see what’s behind it – and offers up tips on how you can safeguard your…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

572 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question