Solved

Simple logger set up for my router.

Posted on 2016-08-28
2
15 Views
Last Modified: 2016-09-17
I am not very computer savvy.. I want to set up a logger or sniffer or something that will capture data being sent through my home router. My daughter is having a hard time at school and I want to see she isn't being bullied via messages in her phone or apps on it, like what's app ect.. She will not let me on her phone so this is the only way to see she is ok, as her life is in that phone.. Can anyone help please? I'm in UK.
0
Comment
Question by:Matt Loxton
  • 2
2 Comments
 
LVL 61

Accepted Solution

by:
btan earned 500 total points (awarded by participants)
ID: 41774901
I do suggest the monitoring on her phone is still the best approach and more frutiful because though social online or web email or chats will already be protected against the man in the middle sniffing - which you are thinking of. So even if we have a sniffer at router or hardware tap to the router it will not help as much since the traffic is encrypted by SSL or equivalent (including use of anonymous service such as TOR etc).

We do want to respect her privacy but at the same time as parent, the concern is legit on the cyber bullying and online threat that she may faced and not able to handle. It is tough to reconcile and strike a balance but suggest you have go for the oversight of her phone not to her knowing for a start and the appl installed in her phone will remain stealthy and not easily detectable by her savviness. It is possible.

The whole spirit for addressing such concerns is also for parent to ensure such appl used is specially developed and designed to help parents to keep their children safe (and for some on co-workers productive) so that its usage is deemed as absolutely legal. So if are open to this, I do suggest you discuss with family spouse and garner the family support first. Thereafter, you may check out such monitoring (avoid the "spy" term) appl like
-mSpy @ https://www.mspy.com/
(also works on non-jailbroken iOS devices, though monitoring features may be limited with this solution option.)
- Spymaster Pro : http://www.spymasterpro.com/safe-to-use/
(feature list) http://www.spymasterpro.com/features-of-spymaster-pro/
0
 
LVL 61

Expert Comment

by:btan
ID: 41802899
As shared by expert though it is not directly solely relying on network sniffing and phone oversight is still more effective.
0

Featured Post

How to run any project with ease

Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
- Combine task lists, docs, spreadsheets, and chat in one
- View and edit from mobile/offline
- Cut down on emails

Join & Write a Comment

The foremost challenge encountered by an investigator at the very beginning of a forensics investigation is, accessing a file/data to read/view its contents. Owing to the fact, a platform is necessary for both; opening as well as examining any file.…
In this era, as you know, cybercrime and other sorts of frauds using the internet has increased day by day. We should protect our information assets and confidential information from getting exploiting by the attacker or intruders. Most of the fraud…
Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

758 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now