Solved

Online School Website Access MAC

Posted on 2011-03-17
2
521 Views
Last Modified: 2013-11-16
Hi,

I have a child who is bring accused of "hacking" into her online school teacher account.  This is what happened...
She attempted to login to her account to start her class and she was greeted as TEACHER instead of her name.
She attempted it two more times with the same results.  The FOURTH time she attempted to logon she was finally able to access her account.  She uses a username and password to access her online course.

This school is trying to prove that she actually "hacked" into their teacher access.  The teacher access is actually a numerical code.

Can you suggest software that I can use to check her internet activity on her MacBook?  How can I help her?

Thanks.
0
Comment
Question by:mbcasey
2 Comments
 
LVL 15

Accepted Solution

by:
roylong earned 500 total points
ID: 35157516
You may not be able to do this retrospectively - you would ordinarily have some behaviour logging software installed before this event.

For the school to prove anything, though, they would need to provide definitive evidence of what the student is being accused of (e.g. webserver records/logs or firewall logs with an IP address which can be definitively proved to be assigned to the computer from which the alleged hacks took place).  After all, what is the basis of their accusations?  
0
 

Author Closing Comment

by:mbcasey
ID: 35173417
The situation was resolved but at least I know how to protect this student (my goddaughter)!!

Thanks.
0

Featured Post

Back Up Your Microsoft Windows Server®

Back up all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
Healthcare organizations in the United States must adhere to the guidance of both the HIPAA (Health Insurance Portability and Accountability Act) and HITECH (Health Information Technology for Economic and Clinical Health Act) for securing and protec…
An overview on how to enroll an hourly employee into the employee database and how to give them access into the clock in terminal.
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question