using kindle/ tablet/ iPad in meetings how to police?

by purrpurr 38 Replies latest jw friends

  • steve2
    steve2

    Just keep it on mute. Some of those porn sites are very noisy.

  • purrpurr
    purrpurr

    Well plenty of apps work off line so I think from here on I'm I will turn off the WiFi connection on my tablet so that it doesn't connect to the hall WiFi. If I'm reading text it will be very difficult for someone to see if its watchtower or not. And yea BTW the congregation does have the WiFi password at my hall.

  • Splash
    Splash

    So with all these devices connected to the same network, could you start browsing the photo's on other peoples tablets?

    Splash

  • Fernando
    Fernando

    Whilst there are risks, this has to be the best device to cope with meetings if one really has to go to these apostate GB propaganda sessions.

  • Dis-Member
    Dis-Member

    oops..

  • Dis-Member
    Dis-Member

    If they really wanted to then YES.

    Tracking website traffic from your router allows you to see a complete breakdown of the sites that have been accessed through your network. Routers track traffic using router logs, which list the data packets that have entered and left the network through that router. This type of tracking can be a useful way of monitoring your Internet usage.

    Router Logging

    Logging capabilities are usually part of a router's firewall function. Firewalls provide a network security service that examines all network traffic as it enters or leaves a network. With logging enabled, the router takes a record of all firewall activity and stores it in a text or Comma Separated Values file. You can then use these router logs to work out which sites have been visited from your network by looking at the outbound packets that have passed through the firewall.

    Disadvantages of Router Logs

    One disadvantage to tracking Internet use through router logs is that the logs themselves often require a degree of skill to interpret. For example, it might not be immediately obvious which packets are outbound packets and which are inbound packets, and most logs only list IP addresses instead of human-friendly Universal Resource Locator links. In addition, checking raw router logs does not give you any indication of which user attempted to access a given site.

    Log Analyzer Software

    Log analysis software, such as WallWatcher and Link Logger, helps you to work around some of the disadvantages of using router logs. These programs take logs straight from your router and process them into a more readable format. In addition, most log analyzers are able to store usage details and compile statistics over a period of time. This can help you to identify whether a few particular sites are being regularly accessed through your network.

    Your ability to monitor the sites accessed by your Wi-Fi clients depends on your networking hardware. The easiest way is to download a network monitoring software that uses Simple Network Messaging Protocol. SNMP, however, is not supported on most home routers. Even with SNMP, the information is not always detailed enough to identify specifically who is accessing which site. A more thorough option involves port monitoring. Business-class wireless access points often include a port monitor option to connect a wired PC directly to the access point through Ethernet and have all wireless information forwarded to you. You can then use a sniffer to identify which IP addresses are making Internet requests to which servers; however, sniffers can only evaluate non-encrypted data. If the user you’re monitoring is connecting through a VPN tunnel, for example, you’ll only be able to see the endpoint address of that tunnel. Alternatively, you can invest in hardware-based Web monitor, which is then wired in-line between the Wi-Fi router and the Internet modem. This approach may be too expensive for the average user, however.

    I suspect though that the person who sets up the hall wifi will have the same qualifications as the person manning the microphones..

  • DesirousOfChange
    DesirousOfChange

    I suspect though that the person who sets up the hall wifi will have the same qualifications as the person manning the microphones..

    This particular Congo has a well qualified Techie with MS certifications.

    Doc

  • someDUDEinAsmallCubicalSomewhereOverTheRAINBOX
    someDUDEinAsmallCubicalSomewhereOverTheRAINBOX

    One positive - you don't have to fake underline :) I don't know how many jdbubs told me they would just underline sh!t right before meetings lol

    Pathetic.

  • Dis-Member
    Dis-Member

    This particular Congo has a well qualified Techie with MS certifications.

    Yes sorry I was being a little cheeky there..

    I doubt though the hall is going to pay to install the required hardware and possible software to monitor and log the data exchange and transfer of every device that's connected to it's network.

  • pronomono
    pronomono

    As Dis-Member brought out, it is entirely possible to monitor network usage. Right now for free, no additional software installed, I can view the logs on my router showing who has been connecting to it and what they have been connecting to. I do this occasionally because I don't have MAC Address filtering on and want to be somewhat sure that someone isn't stealing my internet. But as Dismember brought out, chances are your KH doesn't have someone who knows how to acess or make sense of the data.

    If you are really concerned though, keep a password on your device so that someone cannot get your MAC address if you happen to leave it unattended. Never volunteer your MAC Address. Let's expand this to never use your device on the KH's network, and place your device on airplane mode before you get to the hall so that it doesn't talk to their router. But if you do use their network, make sure that your device name could not identify you because some routers will store the device name and MAC address.

    This only really pertains to what you do over the network though. It's much more difficult to determine what you are doing locally on your device without the aid of the mic guys.

Share this

Google+
Pinterest
Reddit