Thread: Network Security

  1. #1
    Registered User
    Join Date
    Nov 2001
    Posts
    241

    Network Security

    Does anyone know how to create a program (in any language) that can search out and see who or what is watching your computer, and possibly reading emails that you sent. With the email part, I don't think it would be easy as just the sender, but if you sent a copy to yourself, could you find out somehow who looked at it as it was being sent?

  2. #2
    Registered User
    Join Date
    Oct 2001
    Posts
    375
    There is no legal protection for e-mail. Most governments openly admit anymore that they collect each and every e-mail that goes out and search them for anything interesting. Basically e-mail hits mail server, is CCed to gov, then sent to recipient.

    Most employers go through most employee email (work email) due to this lack of legal protection as well. They can even fire you over something you thought you sent in private. If your management is anything like most management, you can bet they've set this relatively easy thing up.

    Face it, it got read. Probablly just by a program looking for red flags, but it got read nonetheless. Encryption is the only way to keep non sophisticated people from intercepting it.
    Allegro precompiled Installer for Dev-C++, MSVC, and Borland: http://galileo.spaceports.com/~springs/

  3. #3
    Registered User
    Join Date
    Nov 2001
    Posts
    241
    I know that, but I did not ask if someone read an email. I asked if anyone knew a way to trace connections so that you can see who had seen an email or see who is monitoring what you are doing.

  4. #4
    _B-L-U-E_ Betazep's Avatar
    Join Date
    Aug 2001
    Posts
    1,412
    I know a sure fire way to tell if nobody has read your email.
    Blue

  5. #5
    $null
    Guest
    Originally posted by Korn1699
    I know that, but I did not ask if someone read an email. I asked if anyone knew a way to trace connections so that you can see who had seen an email or see who is monitoring what you are doing.
    hey dude you have no idea how complex that would be... you obviously dont know much about networking but hey everyone has to learn... anywyas the easiest way to solve your problem would be to encrypt your e-mail using PGP or another high bit encryption program...

  6. #6
    Registered User
    Join Date
    Nov 2001
    Posts
    241
    doesn't anyone here listen, my question had very little, if anything to do with email

  7. #7
    $null
    Guest
    Originally posted by Korn1699
    doesn't anyone here listen, my question had very little, if anything to do with email
    well if you really want to do what your talking about see you in about 5 years... dude thats crazy what you want is something like eterpeek that allows to check to see if you are being packeted or if your going for the simpler approach just a basic port monitor with a simple logger.... you do realise this is a project for a team of programmers that have an exelent understanding of networks and the os's kernel?

  8. #8
    train spotter
    Join Date
    Aug 2001
    Location
    near a computer
    Posts
    3,868
    You are asking about a dozen programs here.

    As your email is sent it travels across the internet. It passses thru many routers / servers on the way to its destination. Email is also checked that the address is valid (in most cases ) before being forwarded.

    To watch it you would need a specialised packet sniffer in each hop of the way. Not possible in general terms, could be done as a one off.

    A firewall like ZoneAlarm has a port watch so you can see if your ports are being scanned. If you don't have it get it.

    If you sent the email to your self would not leave the local domain, just go to the local mail server and back.

    If I was doing it to you, I would be 'spoofing' my IP (pretending to be another IP). This would mean that you could not find me anyway. This is a little harder unless using a NT / *NIX based OS (raw sockets make this easier). Under Win9* my DNS fails when spoofing.

    Or I would get you to plant a trojan / zombie bot on your PC. Bots usually report to a IRC chat room and trojans allow entry to your PC allowing me to download from or to you.

    Find more out about internet security / networking / privacy online here www.grc.com
    "Man alone suffers so excruciatingly in the world that he was compelled to invent laughter."
    Friedrich Nietzsche

    "I spent a lot of my money on booze, birds and fast cars......the rest I squandered."
    George Best

    "If you are going through hell....keep going."
    Winston Churchill

Popular pages Recent additions subscribe to a feed

Similar Threads

  1. Would anyone recommend good network security books?
    By donglee in forum Networking/Device Communication
    Replies: 1
    Last Post: 04-11-2009, 09:11 AM
  2. Network Security Project
    By Lord CyKill in forum Networking/Device Communication
    Replies: 6
    Last Post: 06-10-2004, 05:32 AM
  3. Network Security Project
    By Lord CyKill in forum Networking/Device Communication
    Replies: 2
    Last Post: 06-01-2004, 12:15 AM
  4. Network Security: Firewalls, DMZ, etc
    By RoD in forum Tech Board
    Replies: 3
    Last Post: 03-15-2003, 11:55 AM
  5. frustrated at university network 'security'
    By iain in forum A Brief History of Cprogramming.com
    Replies: 1
    Last Post: 11-11-2001, 11:53 PM