Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror

Comment Apologies (Score 4, Informative) 338

While I'm not a troll by any means, the level of hostility and such has led me to feel it would be a good idea to apologize to everyone for having wasted their time with a ridiculous inquiry. Trolling was never my intention, but it appears I may have done so unintentionally by asking to be informed by people that are experts of many fields, and intelligent and well educated, so you all have what apology I can offer. And I'm quite serious. I don't think I can really say anymore, so I'll leave it at that, link my client to this article, and let him judge for himself.

Comment Re:Who is this (Score 1) 338

I'm sorry that you feel this way but i'm simply trying to educate a very difficult client that I've had no luck getting through to him by talking to him myself. I rather wish I Could give you all his phone number so you could all call him and tell him how paranoid he is.

Comment Re:Define realistic goals (Score 1) 338

Thanks for your very informative answer. Really, all this article is for is for me to have some 'second opinion' proof at how unfeasible this project is. I never thought it was feasible but he insisted that I 'do the research' to find a way. Among most of my research was a bunch of unclear 'it's not feasible' conclusions, but a whole line of slashdotters making fun of my article and telling me to 'get a new client' and book myself into an aslyum should be enough for him. (I hope)

Comment Re:sniffin the network for Facebook "screenshots". (Score 1) 338

To clarify, I have studied formal networking at a local college. Alot of my article was truncated, apparently because it was too wordy, but at least the core of the article is there. My comment in regards to my education was to help everyone understand that i'm not a redneck hilbilly that's never set up a subnet before.

Comment Just to clarify for everyone (Score 0) 338

I allready KNEW alot of what you're telling me..it's excessive, unecessary, paranoid, etc...but I needed to get a second opinion anyway, for the sake of sanity. (Obviously sanity seems to be at a short supply somewhere in all of this), so I linked my client to this article so he can see for himself how excessive his requests are. I agree that monitoring at nework like this is way over the top, that somone needs to get booked into an asylum, (Probably me for even thinking of posting this to slashdot lol), and the whole 'legal' issue thing is him being a nutcase over the leagal matters like he usually is (but not to this extreme). Unfortunately I am the only source of real tech advice for him, so I have to at least address the problem instead of saying 'I refuse to handle your case' or something. I need some reply for him at least. I do understand the situation he's in, but it's nothing like an affair. I know this family well, and this is more of an 'old friend of the family' type of client than a paying one, although i'm sure i'd get some amount of renumeration, but it's also an interesting scholastic exercise in advanced networking. Obviously it's not exactly feasible, like I originally thought, but I thought maybe I had missed a development since I went to college, and wanted to see what the experts had to say. (It's really telling when most of the replies tell me to book myself into an asylum lol)

Comment In reply to alot of the posters (Score 5, Informative) 338

I admit the scope of the project is overwhelming, and I've told my client that he's asking for an NSA quality project. I will direct him to this post and your replies to help him to better understand the nature of his requests. Also, it appears that my article was truncated before being posted, so some of the explanatory bits were cut off, although the core of the question is still there for the most part. And yes, this is an actual client, not myself. I already suspected what most of you were saying, and tried to tell him that, but computers are a big 'mystery box' to him, and I can't seem to nail stuff home on my own. (IF it was myself i would have all already solved this problem.) Also, I'm a little surprised at some of the hostility and non-seriousness i've seen here, but I suppose it is to be expected considering alot of the drama and arguing i've seen going on in other arguments. When I originally wrote the article, I did specify 'serious answers only please, I don't want to start an argument, but a bunch of random answers that are unrelated won't help me solve this problem' And to be more specific, it's a home network with a cable connection. (I obviously can't be too specific due to his need for anonymity to avoid 'alarming' his family to his clandestine monitoring intentions). He does reasonable cause for suspecting something is going on and just needs to have information available to aid him in making decisions about some unusual behavior. and yes, I know that you can't get 'screenshots' right off a client PC through a network, by screenshots i meant some kind of recreation of a visited website, or just text information in printable form off some kind of analyzer software. I really would like to solve this problem, but I agree it's an excessive project. He wants the moon without having to go there to get it, type of issue.
The Internet

Submission + - Internet traffic monitoring

Shalmendo writes: A client has specific needs and it's been awhile since I last worked on an extensive networking project. Therefore, I need some advice from the slashdot community, and the variety of experts within it.

My client needs to monitor traffic on his LAN, particularly going out to the internet. This will include websites like facebook, myspace, and similar, including from mobile devices.

So far, based on the network education I have, I've concluded that it might be best to get a tap (And some kind of recording system with wireshark, probly a mini-barebone), or replace the existing Linksys router with a custom built mini barebone system with linux routing software and appropriate storage capacity etc to record traffic internally. (either way it looks like I will need to put together a mini barebone system for some purpose)

My client is trying to protect his family from scammers and other unsavory types, and isn't savvy in this matter, so i'm doing it for him.

What I need is a way to record the traffic at a singular point, like modem/router areas, or similar, and a way to scrape out facebook, myspace, and other messages. It also appears that the client's family is using iphones and some game called 'words' which has message capability. Is it possible to scrape messages out of that game's packets, or are they obfuscated? Can I write a script?

What software would you recommend? Linux routing OS? Can we sniff packets and drop them on the internal hard drive? or would a tap be better?

How do I analyze and sort the data afterwards? my client needs easily read evidence (Such as text or screenshots) he can use as proof in discussion with his family to try and intercede in any potentially harmful transactions.

In other words, how can I Achieve this goal? I have basic and medium training in computer networking, so I can make my own cables and such, but I've never worked on this exact kind of project before, and thought it might be better to query slashdot instead of do my own research from scratch.

After days of discussion with the client, it's not plausible to put monitoring software in the devices on the network (due to leagal issues and a few other factors), so I concluded a network tap or other device would be the best way to capture and study what's going on.

This needs to be clandestine.

Serious answers please! I'm not looking to start a debate, i just want some recommendations.

Slashdot Top Deals

Practical people would be more practical if they would take a little more time for dreaming. -- J. P. McEvoy

Working...