.....they don't filter my computer. I can go on all of my hunting and gun sites!!!
[Flower][Flower][Flower][Flower][Flower][Flower][Flower][Flower]
Printable View
.....they don't filter my computer. I can go on all of my hunting and gun sites!!!
[Flower][Flower][Flower][Flower][Flower][Flower][Flower][Flower]
but now they will, because someone is going to those sites on their computers... :)
awesome!
There are always sales positions open for the right guy.
They are setting you up. It is called entrapment. :)
TS - sounds like what I do here at work. I have another "tab" open to an innocuous I.T. related site (today it's Configuring Windows Firewall...).
I switch back and forth as folks walk by.
I am allowed some "morale" time on the system, but if I have the same page open for hours - even if I haven't accessed/updated the page for teh entire time - I'll become the object of his displeasure.
Still beware! Not filtering is not the same as allowing. If you signed a employment agreement or rules of conduct, then they can just keep track of what sites you visit (even down to what keys & clicks you use) to keep in a file for one day when the employer wants to have a "negotiation" with you. If the sites you visit go against your contract then you may be putting yourself in a position.
Not trying to be a pessimist just trying to keep it real, and maybe help you keep out of hot water.
[Beer]
I think that key loggers are illegal unless they openly declare that they are using them.
Perhaps key loggers, but not software that tracks websites visited and time spent there. If you are using company computers, on the company internet pipe, then you really have no right to privacy. There is usually a statement on an employment agreement that states something to the effect that all information and communication via company assets are company property.
If you wrap your fingers in tin foil I've heard that helps keep your identity anonymous, though. I'm just saying....
[Coffee]
You guys are all a bunch of goldbrickers.
This is a pretty darn good writeup on getting around those filters. If this doesn't work, set the redirect port as port 53 (DNS). [Beer]
http://www.medicalnerds.com/port-for...with-sshputty/
http://www.urbandictionary.com/defin...rm=goldbricker
He's saying we should be working instead of on CO-AR15. He'd have a point, in my case, if I wasn't self employed.
H.
Not a goldbricker. Just a guy with a lot of down time. I'm only judged by the amount of money that I put on the dock each month. I can run around and act busy but I wouldn't be fooling anyone at all. I just sit and wait for the advertising to kick in and then it's off to work. Then it's sit and wait, then off to work, then sit and wait... so on and so on.
Not sure where you are obtaining your information, but if an employer is paying for/providing you a computer/network it is THEIR computer and they are free to install whatever software they like. My guess is that if you read the login splash screen there is some sort of message indicating that your activity may be recorded/monitored and that by logging-in you consent to them doing so.
Actually you will find that in most employee handbooks and employment agreements they will have clauses stating that regardless of what you THINK they are watching or what is allowed, Everything can be and usually is monitored.
this is simply to protect the company from vulnerabilities in browser applications, as well as potential for civil or criminal vulnerabilities for internet communications.
Seriously, we caught a guy IN IRAQ surfing child porn site...
you can wrap it, proxy it, encrypt it... but in order for it to get where it has to go... There have to be headers that the routers read.
and then you have Server Logs, firewall logs, IA Devices that copy your traffic and send it to an ARC site.... almost forgot all about that.
I Suggest you dont do anything on a company/Public/Government computer that you dobnt want your Boss/District attny/JAG to see.
Best practice policy.
Luckydog, if your Boss OKs it, rock on.
CYOA
VPN will only show (unencrypted) headers to the VPN server, the payload (including packets that could go on to the wider internet) is encrypted. Same with a secure shell tunnel. If you can't trust the network you're on (Starbucks, hotels, airports) and you have a server somewhere on a network you do trust, you can setup a VPN/ssh between them.
H.
agreed.
there's more to it than this... federal warrants for proxy server/VPN session logs and such..
there is ALWAYS a trail
but yes, your information is accurate :D
Stuart.
They dont have the right to utilize the passwords you provided to their equipment to access your bank account, this is correct. However the argument is made that you have provided the information to the company computer freely and with knowledge that the system is being monitored.
Typically what I have seen is hours and hours of logs, compiling the logs into chronological order by terminal, shipping that to legal/JAG and it either results in civil action and termination or UCMJ Actions.
It's best just not to risk the silly stuff on someone elses computer
our internet logs get turned over to 7news once a year - open records act. I only go where I should as needed for work. My time is your money...
they are tracking, they are watching and they are keeping it in your file for a rainy day and they need something against you. (someone else said this too above^^..)