Question:
How may I know who's viewing my PC?
Atomin
2006-11-09 03:20:40 UTC
My PC acts as server to 4 or 5 more, how can I know if someone using my login name and password is viewing my files, internet history etc? I mean, all our login names and passwords are similar, only our initials change. I think all my coworkers know that, so they can view everybody else's.
Four answers:
ThE TiTaN
2006-11-09 03:26:43 UTC
u cant but you can stop them by installing a firewall like zone alarm firewall
zack
2006-11-09 03:39:53 UTC
the best thing to do is to use network sniffers this software captures tcp/ip packets



get this software u can find who are invading your computer



Ethereal: A Network Protocol Analyzer



Powerful Multi-Platform Analysis



Ethereal® is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education.





Features



Ethereal is still technically beta software, but it has a comprehensive feature set and is suitable for production use. Here is the list of features, current as of version 0.9.14, in no particular order:



* Data can be captured "off the wire" from a live network connection, or read from a capture file.

* Ethereal can read capture files from tcpdump (libpcap), NAI's Sniffer™ (compressed and uncompressed), Sniffer™ Pro, NetXray™, Sun snoop and atmsnoop, Shomiti/Finisar Surveyor, AIX's iptrace, Microsoft's Network Monitor, Novell's LANalyzer, RADCOM's WAN/LAN Analyzer, HP-UX nettl, i4btrace from the ISDN4BSD project, Cisco Secure IDS iplog, the pppd log (pppdump-format), the AG Group's/WildPacket's EtherPeek/TokenPeek/AiroPeek, or Visual Networks' Visual UpTime. It can also read traces made from Lucent/Ascend WAN routers and Toshiba ISDN routers, as well as the text output from VMS's TCPIPtrace utility and the DBS Etherwatch utility for VMS. Any of these files can be compressed with gzip and Ethereal will decompress them on the fly.

* Live data can be read from Ethernet, FDDI, PPP, Token-Ring, IEEE 802.11, Classical IP over ATM, and loopback interfaces (at least on some platforms; not all of those types are supported on all platforms).

* Captured network data can be browsed via a GUI, or via the TTY-mode "tethereal" program.

* Capture files can be programmatically edited or converted via command-line switches to the "editcap" program.

* 759 protocols can currently be dissected:





download free ::http://www.ethereal.com/
Marissa
2006-11-09 03:33:24 UTC
Why don't you change your password so you will not have anyone viewing your PC? Our IT employees can see everything we send over email, etc. but we do not see theirs. Maybe there is something I am missing here.
2006-11-09 03:40:26 UTC
i can not believe in this time of security and heightened awareness of every ones activities in the real world and the cyber one , that people still use passwords that a monkey could solve in ten minutes!!! CHANGE YOUR BLOODY PASSWORD THEN!!!


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Continue reading on narkive:
Loading...