Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Yup however we have Cisco coming in next week and gonna show us a way to spoof connections......so the applet thing is removed and once the session starts it can support encryption connections for keywords. E.G. If someone is reading emails over a personal device via SSL and it has a keyword we dont like it will flag. Apparently it been possible for years god knows...

yea that old. I know companies been doing that for over a decade know

Apparently a supervisor liked a girl I was dating. She sent me a email which had keyword "kiss" at work, IT alerted his buddy supervisor and I think you know the rest lol


But I seriously doubt you guys can read ssl https paswords just based off a person joining the wifi and if so that can be deviated by using autofill password managers :)
[doublepost=1490228605][/doublepost]
There are places that actively monitor, watch, read, etc. every line of code that passes through the wired and wireless network. Regardless of whether it is personal or company computers.

The local university does that. And guess what... they can continue to monitor and trace that wifi communication as they walk the halls and locate the offenders wifi device.

We've even messed with them by hiding a wifi device in the walls and ceilings without telling anyone. And the IT department came running straight to it in less than 3 minutes. They are on it.

Some companies take this stuff seriously. Fortunately, in our case, while we were busted, they were impressed by what we had set up, and how well we had concealed its tracks, that they gave us a little bonus to encourage further development of our skills, as long as we promised to not do it on their network again.

And for the record, nobody at the school had any idea that we were even contemplating the little experiment. So IT was at their usual level of alert.

But, they do come running fast anytime any student attempts to violate any rule. And they will walk right up to you and identify you as the problem.

Every packet of data on the network is actively monitored. And every violation of the rules is immediately caught. You see them coming.

After observing this a few times, the instructor taught us to use the same tools. It's actually very simple. And it's interesting to play with.

We can actually sit in the classroom and monitor the data traffic in the building if we want to. And the portable tracer is very accurate. We've been experimenting with trying to trick it (under supervision). It's an interesting device.


LOL there is no portable tracer device that will find a person device that is using the wifi.

what IT knows is the general area of the offender and they know what kid of device it is and location so they go looking for the most suspect looking person that is using the device and spy on you screen then they say something

No device can directly trace somebody device that is on the wifi network
[doublepost=1490229046][/doublepost]
[attempted-sarcasm]actually typed it, but[/attempted-sarcasm] yes.

That is a dang lie. HAHAHA
[doublepost=1490229237][/doublepost]
The typing part was the sarcasm... sorry I should have just said yes.

The answer is yes, I can look at ssl traffic on my network very easily.

you can look at all day all the numbers and symbols and odd language but you cannot read the "actually" encrypted data
 
OK, I'm the bad guy in this scenario. I put in and run the systems that restrict and monitor what happens on a corporate network, in my case a rather large film and TV company.

My advice is simple. If you're connecting to their network ask permission first. Also ask if there are any fair usage policies you are supposed to comply with. These legally have to outline exactly what monitoring IT will be performing (exact laws depend on territory of course).

If you're unhappy with what's in the policy, don't connect your computer to their network. Because when it comes to it you have no right to do so without their permission. Ask for a corporate build machine to do your work on instead.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.