Can home users be monitored realtime?

  • Thread starter Loren Booda
  • Start date
  • Tags
    Home
In summary: And this was supposed to be some kind of "OMG" moment. :rofl:In summary, the conversation discusses the possibility of an outsider being able to scrutinize someone's screen in real-time while using cable internet service. The use of a VNC server or a trojan virus can allow for remote access to a computer's desktop. However, this can also be used for legitimate purposes, such as monitoring employees. The conversation also mentions the possibility of reading display EM emissions, but it is deemed as an unlikely and exaggerated threat. The use of a good firewall and virus scanner is recommended for protection against these types of intrusions
  • #1
Loren Booda
3,125
4
As I use my new cable Internet service, can an outsider possibly scrutinize my screen realtime?
 
Computer science news on Phys.org
  • #2
Your screen? No. Your network traffic? Very possibly.

- Warren
 
  • #3
not in realtime but with some latency, one of the vnc's would do the job.
 
  • #4
light_bulb said:
not in realtime but with some latency, one of the vnc's would do the job.

:uhh: Only if you're dumb enough to be running a VNC server, with no permissions. :rofl:

- Warren
 
  • #5
no but if you let someone use your computer and didn't notice you could have an rdp session running, one of many possibility's when people get sneaky
 
  • #6
btw i can't afford mu foil so i actually tried to shield the yoke and gunplexer with aluminum foil for my ghetto tempest protection but forgot why they don't do that, the monitor started arcing and making lightning noises lol.

rofl, I'm going to leave that the way it is haha, i ment rgb gun assembly.
 
Last edited:
  • #7
Loren Booda said:
As I use my new cable Internet service, can an outsider possibly scrutinize my screen realtime?

Do you want someone to or are you concerned someone might break into your computer and watch what you are doing from the internet?

There are possibilities of both, which is why you should have a good firewall, such as http://www.zonealarm.com/store/cont...lm/freeDownload.jsp?dc=12bms&ctry=US&lang=en", running to help prevent hackers and trojans (virus-like software that allows hackers to take over your computer very easily) from allowing undesired access. Btw, you can use the "basic Zone Alarm firewall" and it will be just as good as the "Pro" version as a firewall, but will be free.

Now, if you DO want to allow someone to watch your screen, then you would use what is called a "VNC" (Virtual Network Computing) program such as http://www.tightvnc.org/" . You have to make sure you get one that is compatible with your operating system though. I don't know if TightVNC will work on Windos Vista. I definitely suggest that you put a password to the VNC server though if that's what you're doing.

Well, I hope this helps clarify things for you.
 
Last edited by a moderator:
  • #8
Loren Booda said:
As I use my new cable Internet service, can an outsider possibly scrutinize my screen realtime?

Not sure what cable has to do with this?
VNC would do it, but...

If you have a CRT (TV or Computer) then the claim is yes.
It is said to be possible to remotely read display EM emissions.
I don't know if they can use the same methods for LCD.
But in addition to pure EM methods I've heard about, I found this
http://www.cl.cam.ac.uk/~mgk25/emsec/optical-faq.html

Your ISP can always tell what you are doing with their link.
Not to mention someone with a packet sniffer.
 
  • #9
Somewhere in my office I saw a screen with "ghost" cursor movement and typing which imitated those of a remote unit. Now I find it scary that someone would relish my multiple typos and stunted hunt-and-pecking.
 
  • #10
Loren Booda said:
Somewhere in my office I saw a screen with "ghost" cursor movement and typing which imitated those of a remote unit. Now I find it scary that someone would relish my multiple typos and stunted hunt-and-pecking.

lol. It sounds like either a VNC server is set up or the computer is infected with a back door trojan that is allowing someone else to remote control the computer. These things have been around for years now. I used to use backdoor trojans to gain entry into my friend's computers when I was younger. I recommend a full virus scan and the use of installation a good firewall.
 
  • #11
Merely management checking up on employees. "Big Bother."
 
  • #12
lol, nice.

I would be a pain in the butt then.. When I'd go on break, I'd start a key stroke simulator on my computer that loops a large text file with a bunch of nonsense sentences over and over.. slowly..
 
  • #13
Loren Booda said:
As I use my new cable Internet service, can an outsider possibly scrutinize my screen realtime?

Yes they could, through either; your computer being infected with a trojan, or like the person said a vnc server running. Having a vnc server running on your computer can be an involuntary event you know! The metasploit framework has a 'vnc DLL inject' payload which can be used against you through just browsing a page (using either a currently known exploit or a 0day one), or having exploitable services open to the internet.

http://www.metasploit.com/projects/Framework/docs/userguide/node52.html


One of the first DLL injection payloads developed was a customized VNC server. This server was written by Matt Miller and based on the RealVNC source code. Additional modifications were made to allow the server to work with exploited, non-interactive network services. This payload allows you to immediately access the desktop of an exploited system using almost any Win32 exploit. The DLL is loaded into the remote process using any of the staged loader systems, started up as a new thread in the exploited process, and the listens for VNC client requests on the same socket used to load the DLL. The Framework simply listens on a local socket for a VNC client and proxies data across the payload connection to the server.

The VNC server will attempt to obtain full access to the current interactive desktop. If the first attempt fails, it will call RevertToSelf() and then try the attempt again. If it still fails to obtain full access to this desktop, it will fall back to a read-only mode. In read-only mode, the Framework user can view the contents of the desktop, but not interact with it. If full access was obtained, the VNC server will spawn a command shell on the desktop with the privileges of the exploited service. This is useful in situations where an unprivileged user is on the interactive desktop, but the exploited service is running with System privileges.
 
  • #14
If you have a CRT (TV or Computer) then the claim is yes.
It is said to be possible to remotely read display EM emissions.

That stuff is ridiculous, I saw this hilarious scare piece on tv about that one time, they were trying to make it look like this was a credible threat to people's privacy, they had this guy on a crt screen computer sitting right near an open window in an "office" on the 1st floor of a building located on a busy street. Then they put this huge antenna right up next to the window, and they had this guy in a van who was able to pick up a blurry replica of the image on the screen of the computer, it was hilarious because the antenna was less than 10 ft from the computer, and directly in view of the person on the computer.
 
  • #15
Yeah good old MetaSploit was what I was going to say. A MS 0day vulnerability/exploit or an unpatched system and it could be done easily, when the cursor flaw came out for all Windows systems I gave it a test and it works really well.
 
  • #16
Van Eck/TEMPEST

Loren Booda said:
As I use my new cable Internet service, can an outsider possibly scrutinize my screen realtime?

Try googling on "van Eck radiation" or "TEMPEST". The latter properly refers to a particular project but has become a general term for a technique which has been used in espionage (for example, I have read that at least one large aircraft manufacturer has used this successfully to steal information from a competitor). See for example http://en.wikipedia.org/wiki/TEMPEST Despite the silly "demonstration" someone mentioned, this technique is said to be highly effective at ranges of a hundred yards (with a few thousand dollars worth of equipment). Furthermore, I am told that it is not hard to concoct a much more impressive demonstration even with jury-rigged off-the-shelf equipment.

Make of this what you will! :uhh:
 
  • #17
Loren Booda said:
As I use my new cable Internet service, can an outsider possibly scrutinize my screen realtime?
By shoulder surfing..
 

1. Can home users be monitored in real-time?

Yes, home users can be monitored in real-time through the use of monitoring software or tools that track and record their online activities.

2. How can home users be monitored in real-time?

Home users can be monitored in real-time through the use of network monitoring tools, keyloggers, and remote desktop monitoring software that track their internet usage, keystrokes, and screen activity.

3. Is it legal to monitor home users in real-time?

It depends on the laws and regulations in your country or state. In some places, it is legal for employers or parents to monitor their employees or children, but in others, it may be considered a violation of privacy rights.

4. What are the reasons for monitoring home users in real-time?

Some common reasons for monitoring home users in real-time include parental control, employee monitoring, and security purposes. It can also be used for troubleshooting network issues or tracking productivity.

5. Are there any risks associated with real-time monitoring of home users?

Yes, there can be risks associated with real-time monitoring of home users, such as invasion of privacy and potential misuse of personal information. It is important to have clear policies and guidelines in place when implementing real-time monitoring to ensure the protection of user rights and data.

Similar threads

  • Computing and Technology
Replies
10
Views
1K
  • Computing and Technology
Replies
9
Views
1K
  • Computing and Technology
Replies
11
Views
1K
Replies
20
Views
5K
  • Computing and Technology
Replies
6
Views
2K
Replies
3
Views
762
Replies
5
Views
1K
Replies
1
Views
1K
  • Computing and Technology
Replies
14
Views
2K
Replies
8
Views
2K
Back
Top