correct me if I'm wrong, but that will only tell you the address of the
server that pages are being requested from, and which machine requested
them? it won't tell you what was page was actually requested by that
person...

as for Orwellian: if you're prepared to be slightly annoying to people,
then you might as well go the whole hog and drive them nuts :)

hey, that might not make a bad .sig...

sugarboy

"J. Scott Kasten" wrote:
> 
> At the risk of adding to your employee's Orwellian future, what you
> want to do is just log TCP SYNs going out to port 80.  I beleive the
> -y option in chains specifies SYN only.  Man it to be sure.
> 
> On Thu, Jan 06, 2000 at 09:18:47AM +0100, R. Kuijvenhoven wrote:
> > Hello,
> >
> > I have installed an ipchains firewall/router. I would like to be able to
> > check the "surfing behaviour" of some of the employees, because I know that
> > they will be surfing instead of working if we are not able to check what
> > they are doing.
> >
> > I thought of adding the -l option to some of the ipchains rules, but I think
> > this will generate an enormous amount of log entries.
> >
> > Is there a better way of handling this?
> >
> > TIA,
> >
> > Robert-Jan Kuijvenhoven
> >
> >
> > --
> > To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> > as the Subject.
> >
> 
> --
> J. Scott Kasten
> 
> jsk AT tetracon-eng DOT net
> 
> "That wasn't an attack.  It was preemptive retaliation!"
> 
> --
> To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
> as the Subject.

-- 

If a manager offers "constructive advice" and no-one is around to hear
it, 
    is he still an idiot?

Chris Dowling.
[EMAIL PROTECTED]
[EMAIL PROTECTED]


-- 
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.

Reply via email to