JMI
February 11th, 2004, 05:58
I think perhaps you are missing the bigger picture. It is, after all, "their" internet connection. You "use" it only with their permission and they can monitor it as they wish, although it helps if there is something in your employment package, which you probably didn't read, which explains they have the right to do so.
However, you are only thinking about the issue of their knowing what "exactly" you are doing on the net, when the more "obvious" obversation they can easily make is that you are both "using" their net connection
and making obvious efforts at "concealing" exactly what the heck you are doing by encrypting your data stream "from THEM."
As an employer, I would probably "fire your ass" simply for doing "that" faster than I would for surfing some internet site I might not approve of. The latter action suggest you might be a slacker, wasting valuable time I pay you to do work on "my" stuff. The former strongly suggest you are fricking dangerous because you are doing "something" YOU feel is necessary to actually conceal from my view, and I then begin to wonder what important company information you might be shipping off to places where I might not want it to go (like the IRS or EPA or something

).
The point you are missing is you aren't hiding your "USE" of the internet, you're only providing them with proof YOU don't want them to know "to do what?" Thinking you have concealed the "what" you tend to ignore the "when" and "how much" but you are NOT concealing that unless you are detouring through another machine at the office by a method which can't be detected or traced back to YOU. Of course if you make them suspicious that SOMEONE is doing this, then they have a mystery to solve and that is what THEY get paid to do. It's as addictive for them as Reversing is for us.
Planning requires that you view the issue from the uptight perspective of the office IT watchdog, not from a more calm view to which you might approach the issue if you were to discover someone else using such "tools." Suspicion is their JOB. From that perspective, you have no "need" to be encrypting your datastream, because their is nothing in THEIR business which requires you to do so, and the fact that you ARE, earns you the lable of "suspect." And "suspects" always draw the closest observation.
Those who have the admin password, assuming they are not complete dorks, can view the contents of your machine, gasp, when you aren't even in the office. Then you need to be prepared to have a good explaination WHY these programs are even ON your machine, and you better make sure you have left no trace in your various caches (on your office machine) of any of the pages you have viewed. And just why in the hell do you have encrypted folders young man?
Of course none of that is nearly as challenging as having to learn one or more completely different life histories, which you may be called upon to recite correctly in moments of intensified emotional stress. But, again, that's another story.

Let me just say that the best cover story and the easest to remember is one that is close to the truth. Once you begin to make up lies DURING the coverup, the major hurtle become remembering which lies you told.
Just food for though. Oh what a tangled web we weave.
Regards,