by wintpe » Jul 5th, '12, 12:01
there are tools such as usb recorders that hackers use to record your keystrokes,
but as much of what is done on the interface is point and click then, you would need to record
and playback there mouse as well.
personaly I dont like this idea of big brother, even with childern, you need to trust them and install
a sence of being trusted not to do bad, with an element of supervision.
of course this is not the same as filtering bad sites so they dont stumble onto something that in there eyes,
either needs some difficalt explanation or effects there gradualy learning about the world.
the way this would be aproached in the corperate world where its a different problem, most are adults (or should behave like adults at least)
and could potentialy offend a collegue or be seen us unprofessional , by clients , cutomers and othere employees.
Therefore a similar approach can be taken with children, by making sure that there computers have to go through a transparent proxy
and that there access to root is prohibited, and the transparent proxy (such as the comunity endian firewall) filters what they can visit and recrds what they visit.
It also virus scans all downloads.
You can also install and run auditd, which audits all system calls.
this is effectivly a keylogger at the kernel level and records every action the kernel takes.
its not so easy to review and takes lots of space depending upon what mode you switch on, but its party of C2 security requirments.
Once they are aware that this is in place, they may also act responcibly, knowing that there access can be reviewed and there are concequenses to there
bad use.
which is the same as the keylogger does.
regards peter
Redhat 6 Certified Engineer (RHCE)
Sometimes my posts will sound short, or snappy, however its realy not my intention to offend, so accept my apologies in advance.