/_ /_Did you go to the Spectorsoft website? They answer all these questions. /_ Hmm, I dug for quite a bit and could not find anything other than the FAQ's. Technical information I could not find. Could you forward me the link? /_> Personally, I am amazed at the money spent on this monitoring. I think /_> you are just trying to prove what you already suspect and know. /_> Zero tolerance policies, to me, are more effective....and cheaper :-) /_ /_Things like this are used as proof for dismissing an employee that has /_violated the company's computer use policy. To avoid messy legal /_complications, make sure such software is deployed company-wide and that /_all monitoring is done equally, otherwise an employee could come back and /_claim that they were singled out. /_~M Yes, I know that is what it's purpose is, in theory. In practice, 99% of the cost to deploy/maintain is spent on Eww's & Ahh's; and rarely is action taken. Slap's on wrists in most cases (from my experience). But, that is a whole other discussion for another board. Thanks for the input, I'll dig some more but would really appreciate some links if anyone has a couple. I am just trying to educate myself on the technical aspects behind monitoring and forensics of computers and networks. -mike --------------------------------------------------- PLUG-discuss mailing list - PLUG-discuss@lists.plug.phoenix.az.us To subscribe, unsubscribe, or to change you mail settings: http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss