Search:

Type: Posts; User: nihil; Keyword(s):

Search: Search took 0.10 seconds.

  1. Replies
    20
    Views
    33,597

    Jino, Please look at the date of the last...

    Jino,

    Please look at the date of the last post.............this thread is 4 years old! if they haven't found a solution by now then they never will.

    ;)
  2. Replies
    20
    Views
    33,597

    That reminds me of another objection I have to...

    That reminds me of another objection I have to the wholesale deployment of keyloggers. They are basically retroactive, whereas computer security should be proactive.

    One would normally want to...
  3. Replies
    20
    Views
    33,597

    Hmmmm, I wonder about the significance of these...

    Hmmmm, I wonder about the significance of these "stand alone" laptops?

    Your normal security model would suggest that you protect your LAN and the clients that attach to it. This secures your...
  4. Replies
    20
    Views
    33,597

    In which case they cannot be mission critical and...

    In which case they cannot be mission critical and can safely be ignored. If they were in any way significant they would have to connect to the corporate mail server for e-mails and for a regular...
  5. Replies
    20
    Views
    33,597

    Assuming that the remote PCs are connected to the...

    Assuming that the remote PCs are connected to the LAN on a regular basis this might be a solution:

    http://www.spectorcne.com/

    Otherwise they will probably have to use two applications.

    As...
  6. Replies
    20
    Views
    33,597

    Don't you mean "offsite"? :confused: I don't...

    Don't you mean "offsite"? :confused:

    I don't like the basic keylogger solution for a corporate environment of any size. What you find is that you generate far too much data to analyse.

    I...
Results 1 to 6 of 6