Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations strongm on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Monitor w/o software loaded on target 1

Status
Not open for further replies.

zildjian1107

IS-IT--Management
Nov 14, 2006
5
US
Have recently been a victim of monitoring, but there's no software loaded on my system. Am aware of a handful of products on the market, but don't know of any so far that can monitor w/o the software being loaded on the target. Can anyone assist with info on how this is being done? Is my isp cable being tapped? Any help is greatly appreciated. Thank you.
 

Have recently been a victim of monitoring

And how do you know that ?
What kind of monitoring ?

A few more details would help to provide a meaningful answer..


A smile is worth a thousand kind words. So smile, it's easy! :)
 
Thank you for your response. I was provided with snapshots of my screen. the pics were of a game i was playing while online.
 

were they of your entire desktop, or just the images from the game ? Was the game an online MMORPG, or a local game ?

A smile is worth a thousand kind words. So smile, it's easy! :)
 
Was this done at work? or at your home? This will help us to understand what we may be trying to figure out.

Dan
 
Should you have been playing the game?
If there an AUP in place if in a workplace?

<Do I need A Signature or will an X do?>
 
ty all for responses. actually asking on behalf of friend. she has computer on home network... other half doesn't trust so decided to spy (doesn't like her chatting)... pics are of screen (not whole desktop; chat is visible in pic)... it's online casino game (phantom... not a gambling site)... ty all again for responses... much appreciated
 
oh.. she's also not able to correspond via im (aim,aol,windows msgr, etc..). Chat is also somehow filtered based on keywords and pics aren't in time blocks - pics are snapped whenever keywords appear...
 


I doubt that it is being done without locally installed software.

If there is some kind of remote desktop tool installed (e.g. NetSupportManager, etc - other than the standard MS one) then this may be manipulated or used remotely to 'share' the desktop, but it isn't as likely.

It is more likely the paranoid partner has accessed the machine and installed some software if they're seeing multiple windows in the screenshot (e.g. im/browser/etc).

Listening on the wire would only yield content sent through the network.. images of window frames/images etc wouldn't normally be considered efficient to send unless someone is already remote desktoped into said machine.

This leaves either the abuse of a remote desktop host on the machine, or other installed software - if it is triggered by keyword, then it is pretty unlikely that a user would do that from a remote desktop session.. they may use that session to install their tools, but doing it without invasive methods would be an inefficient way of achieving the objective (and unlikely).



A smile is worth a thousand kind words. So smile, it's easy! :)
 
There are products out there that can be installed locally so that only certain users see them.

A question that I would be asking is do I want to be in the middle of this situation ?????

<Do I need A Signature or will an X do?>
 
other half doesn't trust so decided to spy (doesn't like her chatting)

From my point of view, the monitoring software is the least of her problems. If he thinks he has the right to say what she can and can't do, she should simply kick him to the curb and move on. Blocking the monitoring won't solve the underlying problems.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top