English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

i do not want her to know that i am doing this

2006-11-09 13:29:07 · 14 answers · asked by wickedlindsaywalker 1 in Computers & Internet Security

14 answers

There are different computer programs. Some capture every keystroke and will print out a log of all communications. I agree that you need to communicate with your daughter. I wouldn't say you are a horrible person, or a bad parent, but talking might help the situation. I understand that there are some kids, that are so stubborn and head strong that they must make mistakes before they will listen. Those mistakes can potentially be fatal. Talking is the first step, but if that doesn't get through and you are genuinely worried about what she is doing and feel she is putting herself in danger, it seems like the responsible thing to do is first put the computer in an open space like a living room, and if that doesn't work, look into the programs.

2006-11-09 13:30:59 · answer #1 · answered by Mrs. Bass 7 · 0 0

She password protected everything? On a windows machine? Wow if it's XP i think she must have downloaded a password program. If it's from the welcome screen and you aren't the adminstrator of the computer here's some tips...
1. Place your Windows XP CD in your cd-rom and start your computer (it’s assumed here that your XP CD is bootable – as it should be - and that you have your bios set to boot from CD)

2. Keep your eye on the screen messages for booting to your cd Typically, it will be “Press any key to boot from cd”

3. Once you get in, the first screen will indicate that Setup is inspecting your system and loading files.

4. When you get to the Welcome to Setup screen, press ENTER to Setup Windows now

5. The Licensing Agreement comes next - Press F8 to accept it.

6. The next screen is the Setup screen which gives you the option to do a Repair.

It should read something like “If one of the following Windows XP installations is damaged, Setup can try to repair it”

Use the up and down arrow keys to select your XP installation (if you only have one, it should already be selected) and press R to begin the Repair process.

7. Let the Repair run. Setup will now check your disks and then start copying files which can take several minutes.

8. Shortly after the Copying Files stage, you will be required to reboot. (this will happen automatically – you will see a progress bar stating “Your computer will reboot in 15 seconds”

9. During the reboot, do not make the mistake of “pressing any key” to boot from the CD again! Setup will resume automatically with the standard billboard screens and you will notice Installing Windows is highlighted.

10. Keep your eye on the lower left hand side of the screen and when you see the Installing Devices progress bar, press SHIFT + F10. This is the security hole! A command console will now open up giving you the potential for wide access to your system.

11. At the prompt, type NUSRMGR.CPL and press Enter. Voila! You have just gained graphical access to your User Accounts in the Control Panel.



If it's not from the admin password there are key logger programs out there. Some are stupid while others (that you pay for...) will send you the report of everything she's done and send it to you in an email when she get's on the computer. There is one in particular that i would recommend. It's called Looxee 5.3 and it will send you an email like all the others but it automatically starts up when the computer is on and is completely hidden. You can't see it on the task manager, add/remove programs list, or anything and it will send you an email with every file opened, questionable content written or viewed, and everything.
The trick is you need to get her off of the computer long enough to install and configure the program. Hope this helps!

2006-11-09 21:44:35 · answer #2 · answered by ben t 2 · 0 0

It depends on what part of the computer is password protected. Is the computer hers or is it the familys? If it is for everyone to use make her take the password protection off. If it is hers and she is under 18 tell her you are going to take it away unless she takes the password off. If you can get on the computer when she isnt around try a program called net nanny, or something like it. Another easy thing to do is check the history in internet explorer by clicking on the history icon and the top of the toolbar. You can also look at the cookies. An easy way to find the folder that has the cookies in it would be to do a search of the entire pc for "cookies" then click on the folder when you go in you can see all the websites visited along with dates and times. If you get a program to monitor online behaivior make sure it is one that hides itself so she wont know, usually they tell you if they do this somewhere in the programs description. Here is the net nanny link http://www.netnanny.com/ This program may be better for you however its called pc guardian find it here http://www.download.com/PC-eGuardian/3000-2162_4-10537866.html?tag=lst-0-1

Remember you are the parent and you should set limits with the computer as they have become very dangerous machines when in the hands of naive children. Dont feel bad if you have to be harsh with your daughter its for her safety and overall well being. Good luck to you!

Also dont listen to the idiot who said there was a problem in raising your daughter all kids are sneaky at one time or another.

2006-11-09 21:36:56 · answer #3 · answered by ♥♫♥ Crystal ♥♫♥ 4 · 0 0

Are you her mother or a nosy girl friend?

If mother: Take the computer away from her until she removes the password. Once the password is removed put the computer in a public place in the house where you can view her usage. Then set yourself as the Administrator and Limited User. Give her a Guest User account only. The Admin and LU accounts can be password protected by you and will allow you to control the computer usage by her.

Now you can install a program that will let you know of her computer usage. Every site she visits, every email she gets and everything else she does on the computer. It will also tell you if she trys to bypass your security controls.

http://www.spectorsoft.com/products/eBlaster_Windows/

If a nosy girlfriend: Butt out. What she does is none of your business.

Choose one or the other, but, not both.

2006-11-10 03:32:15 · answer #4 · answered by Anonymous · 0 0

If it is windows based, you need to install a content monitor type application. There are several types available that are good and work seamlessly behind the operations of the users, and can send you reports via email with as much tracking data as you would like. You will need your own desktop on the windows operating system that is rated computer administrator to do this type of installation. If you do not have one or it would be suspicious to try and add your own "profile" or "desktop" you will only be able to do it if you upgrade windows if possible and add it at that time -- these applications will walk you thought the process.

You can find out a lot with out monitoring software in you have your own computer administrator profile on the windows operating system. You do this by searching files,with the search option, and checking temp files, or documents folder , the computer administrator profiles can do this for all profiles on the computer unless one has went to the trouble of making all of these private, most people do not or do not know how. But this method is often complicated and time-consuming and does not give you near as much insight as a content monitoring software package.

Spector is an excellent choice which can go in to more detail than I could here. http://www.spectorsoft.com/

2006-11-09 21:47:38 · answer #5 · answered by Anonymous · 0 0

This situation can be tricky.
If she has it password protected it could be an issue. Because you to find a way to install the software.

Some residential gateways (DSL modem control software) provide a way to hook up and peek into the IP packets being sent from any computer. I do not know how this works though

For the software option I have provided details and links
I have provided a link to the s/w below. It is free

The software once installed has options to make it completely invisible. For example, it provides options
a) to not show up in taskbar and Show up only when
you press a key that you can select say CTRL + F2.

b) Not show up in processes
c) Has additional password to open the logs,
d) once you press CTRL + F2 and it shows up you can open
the logs and see and can also periodically clear. It also provides
options to copy the logs for later use into a notepad

2006-11-09 21:37:49 · answer #6 · answered by rvsasi 2 · 0 0

Why does it matter? If you're really that concerned and intrusive you can purchase software that you have to install on the computer. If she is the only user on that computer, then there is no way of doing it without her knowing. I'd just keep out of her business. You can talk to her, and stress not to meet anyone and to tell you if anyone makes her uncomfortable. All teens do things that you might not consider "appropriate" on the internet, it's just part of growing up in this day in age.

2006-11-09 21:33:50 · answer #7 · answered by The Answer Man 3 · 0 0

follow these steps
go to My Computer in the Start Menu
open C:/ (this is your hard drive)
open Documents and Settings
open the folder with her name (or nickname or whatever account she uses)
Open Cookies
Start Opening files in there, they'll look something like this;

FPSdl www.yahoo.com/ 10884363714563046466

the address (www.yahoo.com/ ) is in the beggining of the long line of incoherent numbers and letters

If you see something that is fishy, copy it out and paste it into the address bar on internet Explorer

That will pull up the webpage

She'll never know.

2006-11-09 21:35:50 · answer #8 · answered by Anonymous · 0 0

Log in as adminator right click the mouse hit explore (Documents and setting)
(Her Folder)
Look though It...
Then if that isn't' enogh look at what on your Internet Files by hitting\
(start)
(All Programs)
(assoccories)
(system Tools)
(disk Clean-Up)
(PUSH OK)
Wait
When done
Hit Search files on Temporary Internet files and you can see what she looking at

2006-11-09 21:39:41 · answer #9 · answered by Anonymous · 0 0

i suggest installing a keystroke recording software, it hides in the background, secretly recordind every keystroke, passwords letters whatever is typed in the or on the keyboard.

2006-11-09 23:51:11 · answer #10 · answered by Anonymous · 0 0

fedest.com, questions and answers