Computer and Network Surveillance

Computer and network surveillance can be done in many ways, including through the use of software that monitors computer activity. These systems gather information, such as source and destination addresses of e-mails and the electronic addresses of websites visited by different people. High-level monitoring systems would likely require access to individual user information. But what exactly is surveillance? What are the possible benefits? Let’s examine a few examples. Read on to discover how computer and network surveillance can be done.

GL’s Passive Network Monitoring and Diagnostic Systems

GL’s Passive Network Monitoring and Diagnostic Systems (PNMD) support service providers and operators by providing real-time and historical data storage, retrieval, and analytics. These systems are designed to connect to IP or TDM networks and capture signaling frame details and forward them to a centralized database server for analysis. The PNMD’s comprehensive reporting capabilities help operators and administrators determine if network performance is suffering due to security or service degradation.

GL’s passive network monitoring and diagnostic system consists of a web server, database engine, and a comprehensive software application. PNMD includes features to monitor traffic and monitor server uptime and provide alerts. It can monitor hundreds of protocols, including HTTP, FTP, HTTPS, and DNS. The software is free, and is continually updated on CodePlex. PNMD is supported by various open source analysis add-ons, as well as a community blog.

PNMD is a great choice for computer and network surveillance.

Carnivore

The FBI’s Carnivore computer and network surveillance system is a computer and network monitoring tool that relies on cooperation from Internet service providers (ISPs). The software is installed on an outside computer located at the ISP’s offices and copies the electronic data that matches the criteria the agents specify. The data is then stored on a removable hard drive that can be retrieved … Continue reading >>>