program
is there a program you can get that tells you whne the net has bee accessed and what sites they were on want to keep track of the comp when im out and is the programs to lock sites and otehr programs
Originally Posted by UnseenMenace
run the net connection through a proxy and check the logs is the easiest way, everything and anything running on the pc itself can be worked around
you would basically run the computers which access the internet through another computer specifically setup to act as a firewall / filtering system for these computers which will log all information going through it.
This way you can set rules to limit connectivity or services and log all internet activity. -- This is not 100% secure however its reasonably effective
Any filtering or log software that is dependent upon running on the system being filtered is very easy to get around
The Australia government for example spent $84 million dollars developing software for this purpose which was cracked within 30 minutes of going live
http://gizmodo.com/gadgets/porn-for-all!/australian-84-million-porn-filter-thwarted-by-16+year+old-293419.php
Its knowledge that will achieve what you wish to do, however your chances of successfully achieving that with Windows on its own and not running though a proxy server is slim as in reality it can not be locked down without reducing functionality.
With OSX or Linux you have a pretty good chance if you understand it
This way you can set rules to limit connectivity or services and log all internet activity. -- This is not 100% secure however its reasonably effective
Any filtering or log software that is dependent upon running on the system being filtered is very easy to get around
The Australia government for example spent $84 million dollars developing software for this purpose which was cracked within 30 minutes of going live
http://gizmodo.com/gadgets/porn-for-all!/australian-84-million-porn-filter-thwarted-by-16+year+old-293419.php
Its knowledge that will achieve what you wish to do, however your chances of successfully achieving that with Windows on its own and not running though a proxy server is slim as in reality it can not be locked down without reducing functionality.
With OSX or Linux you have a pretty good chance if you understand it
Web proxy
Proxies that focus on WWW traffic are called web proxies. Many web proxies attempt to block offensive web content. Other web proxies reformat web pages for a specific purpose or audience (e.g. cell phones and PDAs or persons with disabilities)
Many organizations including schools, corporations, and countries use proxy servers to enforce acceptable network use policies (see content-control software) or to provide security, anti-malware and/or caching services. A traditional web proxy is not transparent to the client application, which must be configured to use the proxy (manually or with a configuration script). In some cases, where alternative means of connection to the Internet are available (e.g. a SOCKS server or NAT connection), the user may be able to avoid policy control by simply resetting the client configuration and bypassing the proxy. Furthermore administration of browser configuration can be a burden for network administrators.
Access control: Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the WWW. The organization can thus track usage to individuals.
http://en.wikipedia.org/wiki/Web_proxy
Proxies that focus on WWW traffic are called web proxies. Many web proxies attempt to block offensive web content. Other web proxies reformat web pages for a specific purpose or audience (e.g. cell phones and PDAs or persons with disabilities)
Many organizations including schools, corporations, and countries use proxy servers to enforce acceptable network use policies (see content-control software) or to provide security, anti-malware and/or caching services. A traditional web proxy is not transparent to the client application, which must be configured to use the proxy (manually or with a configuration script). In some cases, where alternative means of connection to the Internet are available (e.g. a SOCKS server or NAT connection), the user may be able to avoid policy control by simply resetting the client configuration and bypassing the proxy. Furthermore administration of browser configuration can be a burden for network administrators.
Access control: Some proxy servers implement a logon requirement. In large organizations, authorized users must log on to gain access to the WWW. The organization can thus track usage to individuals.
http://en.wikipedia.org/wiki/Web_proxy
Trending Topics
believe its a child control prog you want
like this?
http://www.salfeld.com/software/childcontrol/index.html
add me to msn or something and i can send you a file
like this?
http://www.salfeld.com/software/childcontrol/index.html
add me to msn or something and i can send you a file
I would configure and define user groups and then restrict them using the registry as shown in the methods below
http://articles.techrepublic.com.com...1-5193303.html
http://www.pctools.com/guides/registry/detail/969/
You can also block website by configuring the hosts file such as the method shown below and then restrict any modification by users other than the Admin
http://www.mvps.org/winhelp2002/hosts.htm
for example an entry in the hosts file such as 127.0.0.1 passionford.com would block access to passionford
Using any application to restrict another application is pointless as it clearly shows what you have to attack to work around it
http://articles.techrepublic.com.com...1-5193303.html
http://www.pctools.com/guides/registry/detail/969/
You can also block website by configuring the hosts file such as the method shown below and then restrict any modification by users other than the Admin
http://www.mvps.org/winhelp2002/hosts.htm
for example an entry in the hosts file such as 127.0.0.1 passionford.com would block access to passionford
Using any application to restrict another application is pointless as it clearly shows what you have to attack to work around it
Thread
Thread Starter
Forum
Replies
Last Post
Stu @ M Developments
General Car Related Discussion.
41
Aug 21, 2015 06:47 AM



