• Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 5. ONLINE DISCLOSURES AND THAT B... > Watching You at Home and Work

Watching You at Home and Work

The first part of this chapter has assumed that the people who are watching you do not have access to the actual computer you are using. If you share your computer with someone else, trusted family member or not, or if you are using your employer's computer on your employer's network, it is possible for someone to have a pretty good idea of what you have been doing on the Internet—and on the computer.

First, on your employer's computer network, it is likely that your Internet transmissions are going through some sort of packet-filtering, firewall, or proxy-server configuration. The most common reason for configuring a network this way is to protect the network from intrusions from outside the company. However, it is relatively easy for a network administrator to configure some of these protection tools to monitor network activity and to narrow the monitoring down to a specific computer via a specific IP address.


PREVIEW

                                                                          

Not a subscriber?

Start A Free Trial


  
  • Creative Edge
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint