Welcome to City-Data.com Forum!
U.S. CitiesCity-Data Forum Index
Go Back   City-Data Forum > General Forums > Science and Technology > Computers
 [Register]
Please register to participate in our discussions with 2 million other members - it's free and quick! Some forums can only be seen by registered members. After you create your account, you'll be able to customize options and access all our 15,000 new posts/day with fewer ads.
View detailed profile (Advanced) or search
site with Google Custom Search

Search Forums  (Advanced)
Reply Start New Thread
 
Old 07-29-2008, 11:05 AM
 
13,053 posts, read 12,925,936 times
Reputation: 2618

Advertisements

Quote:
Originally Posted by CR001 View Post
This is an interesting discussion.

What about messages exchanged on instant messenger? Can IT people trap our conversation?

I wonder further whether the BOSS could trap our PC to PC call, such as voice convo. on Skype, MSN, Yahoo Messenger, Google Talk, etc.
Instant messengers were designed with availability in mind, not security. They are highly vulnerable to sniffers and are common methods of network infection through viruses. They are to never be considered "secure" or "private".
Reply With Quote Quick reply to this message

 
Old 07-29-2008, 11:11 AM
 
13,053 posts, read 12,925,936 times
Reputation: 2618
Quote:
Originally Posted by Brian.Pearson View Post
How about Hushmail?

Or if you use Keyscrambler.
One could find ways to secure communication, but keep in mind that that isn't the important point here. The security person could circumvent your security if they needed to, but most don't need to. They would note an unsecured connection on the network (unsecured as in not operating within their security sandbox) and they would seek out the offender. At that point breech of policy would be established. That is, the acceptable use policy of your company would most likely cover this violation and action would be taken against you. It might be something as simple as a warning or it might mean the loss of a job. Also, if any damage was caused by breaking that policy, you might be held liable for it as well.

Strictly put, only do authorized company use of the network and computers. If a person doesn't know what is authorized, they need to ask. Ive seen millions of cases like these and they ALL end badly for the user.
Reply With Quote Quick reply to this message
Reply
Please update this thread with any new information or opinions. This open thread is still read by thousands of people, so we encourage all additional points of view.

Quick Reply
Message:


Over $104,000 in prizes was already given out to active posters on our forum and additional giveaways are planned!

Go Back   City-Data Forum > General Forums > Science and Technology > Computers

All times are GMT -6.

© 2005-2024, Advameg, Inc. · Please obey Forum Rules · Terms of Use and Privacy Policy · Bug Bounty

City-Data.com - Contact Us - Archive 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37 - Top