internet monitoring

Posted on 2007-10-15
Last Modified: 2013-11-24
I heard there are programs that you can remotely monitor internet traffic and see what people are using around you or more importantly see if someone is monitoring your (my) internet use. What are some programs out. I have a guy at work that I think has been monitoring my usage and  I lock my laptop so im sure he has not had physical access to my laptop.
Its a mac os.
Question by:oriontala1
    LVL 69

    Expert Comment

    Hi oriontala1,  the one I use  and  that may assist you in monitoring your own system.
    Active Ports
    This program enables you to monitor all open TCP/IP and UDP ports on a local computer.
    Whenever anyone access your ip address it flashed red, you can then highlight this Quiry Names
    it will show the remote address and local address.
    you then have the choice to terminate the process.
    LVL 32

    Accepted Solution

    Assuming he has no direct access to your laptop (and has not guessed your password), about all he could do is to monitor your network traffic. How easily he can do this depends on what type of network you're sharing. For example, if you are both on a shared hub then he could monitor all traffic to/from your computer by using a network sniffing program like wireshark (formerly etherreal) though it may be impratical to monitor ALL traffic, he could monitor enough.

    On the other hand if you are on a switched network then it would not be so easy, and he would need admin access to the switch to do any monitoring.

    How can you detect if someone is monitoring your usage. For the most part you cannot, because once traffic leaves your laptop it is out of your control, and not easy to detect who may be monitoring it. You can of course limit what you put on the network, and you can also review your network topology to see if it is shared or switched, and who has access, etc.

    LVL 1

    Expert Comment

    Forced accept.

    EE Admin

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    In this article you will get to know about pros and cons of storage drives HDD, SSD and SSHD.
    Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

    729 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now