Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

In Home Web Network Spying & Security


  • Please log in to reply
No replies to this topic

#1 F-1DeskLamp

F-1DeskLamp

  • Members
  • 307 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:San Diego, CA, USA
  • Local time:06:49 PM

Posted 11 March 2018 - 08:39 PM

What are the things that someone can do in a home network?

I have heard that you can install a program that can monitor everything that comes in and out of a router to the ISP and world wide web like a toll monitor able to sample the activities of the house or office at the bottle neck.  

 

I have heard that you can basically duplicate the exact screen someone is using as well as navigate someone's remote computer's drives, files, and syphon out the data contents as well as funnel in content.  

 

What of this is true? 

 

 

It's my assumption that these things are bottom rate expertise stuff, and it would not take long to search the videos, articles, and/or programming out in order to orchestrate all of these things on a home web network.

 

The reason I ask is because I'm in a room rental arrangement with several other tenants the same, so I am aware of these things like anyone should be aware of the potential for bad weather.  It's just another element to fend off.  

 

If you don't know, let me tell you that there are people that are so snooty and laden in their own BS (excuse my Latin :) that there is no reason nor right or wrong but simply what can and can't be controlled.  Among those people you have no right to dignity except by the power of the consequential hand you can position directly over the top of them so to speak with clear warning from you about the new terms where you and they are concerned.  In my experience the person simply re-routes the mind's aptitudes towards being much less an usurping gadfly to becoming someone that is actually working for me in their own right.  I consider it efficient management and taming the community in order to stifle parasitism and disorders while allowing time and clearance for the productive people's ventures to reach the skylight for a change.  That may be too philosophical for some people.  

In any case this is a phenomenon in nature not unlike the weather and not unlike the spy and saboteur are.  Positioning a phenomenon in the logical order to naturally fend off the other is what they call practical.  In the long run it's much cheaper and safer for self and who benefits from self as the risk/reward ratio is balanced more ideally.  

 

 

So with these few things or elements in the environment, what can I do?  

 

I suppose that getting off of wifi, and using the wall power lines as an internet medium from the router is one thing I could do, but I do believe that their is the ability to monitor every element of traffic in and out of the router to the world wide web.  I want to stifle that ability in the network.  From a purely security and risk management perspective I want to be able to deflect all possible snoots and finicky muck-a-mucks from having any means of eavesdropping not even on one internet exchange, not one name of anything, nothing at all.  

 

How do I achieve that?

What should I research? 


Edited by hamluis, 14 March 2018 - 02:58 PM.
Moved from Web Browsing/Email to Gen Chat - Hamluis.


BC AdBot (Login to Remove)

 





0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users