?
Solved

Home Internet Security ... Monitoring ... logging; who is doing what?

Posted on 2013-11-08
7
Medium Priority
?
494 Views
Last Modified: 2014-04-07
Folks, need some guidance/assistance; how I can see/monitor/log, who is going where and doing what too at my home internet, we are using DSL right now but planning to move to cable internet, and having so many devices at home; desktop, laptops, smartphones, galaxy nexus + players & kindle too.

Please advice what are my options, to just monitor/log, who is going where and doing what too, plus with some duration ideas, how much time, they spent there ... or whatever best possible options that I have for my home internet usage/monitoring.

Thanks in advance
MK
0
Comment
Question by:Mushfique Khan
  • 4
  • 2
7 Comments
 
LVL 19

Expert Comment

by:helpfinder
ID: 39633473
probably best would be to use some proxy which will monitor who is doing what - e.g. Squid
Or something like Kerio Control

You can do some basic limitations like bandwidth limits for machines, QoS or web filtering on your router (if it supports) but for such a monitoring you described you will need something more rubust and running 24/7
0
 

Author Comment

by:Mushfique Khan
ID: 39675890
thanks helpfinder, when tried to search for Squid there are so many links are coming, can you please provide the link, from where to get it and also how to configure too, struggling and searching a lot, basically bought this OpenDNS too, but it's not showing anything, waste of money.

In my Netgear R6300, do have a facility to block everything, but this I was not looking for, just would like to know, who is going where and if possible to get some duration idea too, that'll be great.

Please assist/advice/guide here ... thanks a lot.
0
 
LVL 19

Accepted Solution

by:
helpfinder earned 2000 total points
ID: 39676138
Hi,
you should be able to download it here:
http://www.squid-cache.org/Download/ftp-mirrors.html

Configuration, well, you need to study how to configure and what to configure, just take a look at documentation:
http://wiki.squid-cache.org/SquidFaq/ConfiguringSquid

or watch some video tutorials like:
http://www.youtube.com/watch?v=LnBG_LEvvVw

I am sure there are more user friendly proxy solutions - like Kerio Control, but it´s paid software on other hand
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:Mushfique Khan
ID: 39676291
thanks helpfinder ... you are good & quick too, let me try, will keep you posted.

Best regards.
0
 

Author Comment

by:Mushfique Khan
ID: 39676304
but I'm at Windows, I can do it on Windows XP too ... correct? or do you have any recommendation?
0
 
LVL 9

Expert Comment

by:jfer0x01
ID: 39816874
I think you really want something like Untangle, this way you see what is going on with Network traffic.
Site: http://www.untangle.com/

However, you need to setup a dedicated box or VM to run the free version and install device between your ISP and your router. This way, you see all the traffic.

You can also attempt to "Flash" your Router with openwrt or ddwrt. These provide the ability to install packages that can facilitate your goal. However, none if these things are simple push button solutions. If you are serious about this: 1. Buy an untangle or similar device 2. Post multiple question on EE to take you step by step achieving this goal.

Good Luck
0
 

Author Comment

by:Mushfique Khan
ID: 39826938
thanks jfer0x01, but how to do these;

However, you need to setup a dedicated box or VM to run the free version and install device between your ISP and your router. This way, you see all the traffic.

You can also attempt to "Flash" your Router with openwrt or ddwrt. These provide the ability to install packages that can facilitate your goal. However, none if these things are simple push button solutions. If you are serious about this: 1. Buy an untangle or similar device 2. Post multiple question on EE to take you step by step achieving this goal.

Can you please either direct me to some link/step by step or something, in order to proceed further, accordingly.

thanks again.
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let's take a look into the basics of ransomware—how it spreads, how it can hurt us, and why a disaster recovery plan is important.
With more and more companies allowing their employees to work remotely, it begs the question: What are some of the security risks involved with remote employees and what actions should we take to secure them?
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

850 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question