Solved

Keylogging by my employer

Posted on 2012-03-28
3
625 Views
Last Modified: 2012-03-28
My university has installed McAffee on the system and it would appear from the McAffee agent status monitor that my every keystroke is being monitored. However, I am not sure I fully understand the output from the Monitor. Would you interpret this for me? File attached.
Agent-Monitor.log
Agent-Monitor--2-.log
0
Comment
Question by:ccressy5
3 Comments
 
LVL 30

Expert Comment

by:IanTh
ID: 37775624
mcafree is not a key logger imho
0
 
LVL 12

Accepted Solution

by:
antony_kibble<!-8D58D5C365651885FB5A77A120C8C8C6--> earned 230 total points
ID: 37775821
There is nothing there untoward. That is a normal McAfee agent log of a McAfee agent trying to contact the ePO server to see if there are any tasks or updates available. It is not trying to log your keystrokes or what you are doing.


I have never heard of any McAfee component that acts as a keylogger.
0
 

Expert Comment

by:Threading
ID: 37775851
There is an anti key-logger software available to check and uninstall key-loggers.  Although if your employer really want't to log you and they know how to hide the process, mediocre user will find it hard to see if you are being tracked.

Although if it is not your computer you are using, I would do anything that may upset my employer.  

For example in my employment contract it states that employer may use surveillance, although my job is nothing special.  my employer just used a contract of the shelf.  

1) McAfee should not record keystrokes and <IanTh> thinks.
2) If you are worried about other key loggers being installed, try Spybot - Search & Destroy, or any other anti-threat application to scan.
3) In log files that you had attached I don't see anything about your keystrokes recorded.
0

Featured Post

6 Surprising Benefits of Threat Intelligence

All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

Join & Write a Comment

SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
Transferring data across the virtual world became simpler but protecting it is becoming a real security challenge.  How to approach cyber security  in today's business world!
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now