How to Tell If Your Internet Traffic Is Being Monitoredby Anthony Oster
Though many people consider their computer to be personal space, your privacy can be compromised by watchful employers, jealous exes and malicious hackers. Threats to your privacy occur most commonly through the use of stealth apps such as keystroke loggers and traffic monitors are used to track your online presence. Before eliminating the threat caused by these programs, you must first decipher if you are being monitored and who is monitoring your traffic.
Monitoring Your Outgoing Traffic
Click the Windows Start button and type "cmd" to launch the Command window, which will display as a black box with white text reading "C:\Users\Your Username."
Type "netstat" next to the prompt and press "Enter" to generate a list of all outgoing data transmissions. The Netstat command works best when you have as few applications opened as possible, preferably just one Internet browser. The Netstat generates a list of Internet Protocol (IP) addresses that your computer is sending information to. Some of these IP address are legitimate and correspond to websites or services that you are using.
Document each IP address reported by Netstat and launch a Web browser. Enter each IP address into your browser's address bar and press "Enter" to attempt to locate where the information is being sent.
Locating Stealth Apps
Right-click your taskbar and select "Start Task Manager" to launch your task manager, a list of all running processes on your computer.
Close all programs except for one Web browser.
Select the "Processes" tab, then select "User Name" and browse through the list to view all processes running on your computer. Processes that do not include your username may be an indication of malicious software running on your computer.
Document the processes running and investigate their use online.
- check If being monitored by your employer, the best preventative to monitoring is to not do anything worth being monitored. Keep personal email, communication and Web browsing confined to your home and wireless devices not connected to your company's network.
- close Many employers monitor your activity using software on your computer, or filter all Internet traffic through a singular point within their network. Attempts to disable, remove or circumvent this may violate several rules of conduct and operation in your workplace.
- link Tech Radar: 15 Task Manager Tips for a Faster PC
- link Petri IT Knowledgebase: Using the Netstat Command to Monitor Network Traffic
- link Oracle System Administration Guide: Monitoring Network Status With the Netstat Command
- link Microsoft Windows: How to use and Troubleshoot Issues With Windows Task Manager
- photo_camera Sean Gallup/Getty Images News/Getty Images
Click here to provide feedback on this article