Go | New | Find | Notify | Tools | Reply |
Nullus Anxietas |
Sure. It's called a "Man In The Middle" attack. But it takes more than just installing a "corporate certificate" on client machines. I don't mean to be insulting or dismissive, but an explanation of how public/private key cryptography works would take way more effort than I'm willing to expend There are plenty of on-line resources, however. "America is at that awkward stage. It's too late to work within the system,,,, but too early to shoot the bastards." -- Claire Wolfe "If we let things terrify us, life will not be worth living." -- Seneca the Younger, Roman Stoic philosopher | |||
|
7.62mm Crusader |
Read it and thank you Rey HRH.. | |||
|
All the time |
Yes, there are a number of ways to achieve it. A good corporate firewall will have the ability to decrypt any encrypted traffic entering and leaving the network. Thus my statement that they can see everything you're doing. We havem't even touched on remote monitoring with capture of your screen, keystrokes, etc. My short answer to anyone asking this question is "don't use corporate assets for personal stuff." That also applies to a personal mobile phone or tablet with company email / mgmnt. software. Use a second device... | |||
|
Powered by Social Strata | Page 1 2 |
Please Wait. Your request is being processed... |