Re: Monitoring office web use

2003-01-31 Thread Mike Robinson
Though not quite the path you're looking down, I'd recomend using a proxy server and then parsing it's log files. I use squid (www.squid-cache.org) with squidguard (www.squidguard.org). I parse the log files with some ugly shell scripts, but there's a handful of logfile parsers listed on the sq

Re: scary site

2002-03-09 Thread Mike Robinson
IE's hooks into windows make IE security vulnerablilities into OS vulnerablilities. Netscape and other browsers, though just as able to have vulnerablities, are seperated from the underlying OS making it a step harder to attack the user's system through their browser. m. Hornat, Charles wrote: