Solved

How can find the link from which a Java program was installed?

Posted on 2014-03-06
3
397 Views
Last Modified: 2014-03-24
Just curious....the IT tech could trace the link where I downloaded a program(Java-based) that we use in our workplace to process CC payments. I was sent the download link from the actual company that owns the software, but she didn't need it. This amazed me. How can you tell the http: address where a program is downloaded from? She didn't look in history. Of course, my computer is on a network, so I don't have rights. I would like to learn, not hack. Thanks in advance.

This could be useful to find where programs install themselves on my home computer without my knowledge.....yes/no????
0
Comment
Question by:sheana11
3 Comments
 
LVL 26

Accepted Solution

by:
dpearson earned 500 total points
Comment Utility
An IT department will generally have logs recording URLs/IP addresses for where all files are downloaded from.  So they could do things like look at a given machine to see all files transferred to it (from outside the company).

Nothing very magical - just keeping records.  BTW that recording is usually done at the network layer - the switches and routers for moving data around the company.  It's not about installing a program onto the end user's computer to monitor it or anything like that.

So it's not a huge help for you on your home computer - because you probably just have a very simple network at home, like a single router box from your cable company or some such, which may not even support logging.  That's a bit different from a company's IT department.
0
 
LVL 86

Expert Comment

by:CEHJ
Comment Utility
You can only really tell from the history of whatever app downloaded it. Unless you've got something very special like a logging firewall or something (you might have that in a commercial context)
0
 

Author Closing Comment

by:sheana11
Comment Utility
Great answer. Thanks.
0

Featured Post

Find Ransomware Secrets With All-Source Analysis

Ransomware has become a major concern for organizations; its prevalence has grown due to past successes achieved by threat actors. While each ransomware variant is different, we’ve seen some common tactics and trends used among the authors of the malware.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Python Assistance 7 31
base64 decode encode 12 96
Non-recursive backtracking, using a stack 1 48
SIEM traffic 5 25
Using in-flight Wi-Fi when you travel? Business travelers beware! In-flight Wi-Fi networks could rip the door right off your digital privacy portal. That’s no joke either, as it might also provide a convenient entrance for bad threat actors.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Viewers will learn one way to get user input in Java. Introduce the Scanner object: Declare the variable that stores the user input: An example prompting the user for input: Methods you need to invoke in order to properly get  user input:
The viewer will learn how to implement Singleton Design Pattern in Java.

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now