Stats

Comment

Hati-hati Menggunakan Komputer Kerja di Kantor

Posting Komentar
Berhati-hatilah menggunakan komputer kerja Anda di kantor karena mungkin saja komputer yang sedang Anda gunakan diawasi orang lain dari jarak jauh tanpa Anda sadari. Berikut cara untuk memonitoring komputer dari jarak jauh (remotely) yang dikutip dari howstuffwork.com.

Every time you provide some form of input for your computer, whether it's typing on the keyboard or opening a new application, a signal is transmitted. These signals can be intercepted by a desktop monitoring program, which can be installed on a computer at the operating system level or the assembly level. The person receiving the intercepted signals can see each character being typed and can replicate what the user is seeing on his or her screen. Desktop monitoring programs can be installed in two ways :1. Physically - Someone sits at the computer and installs the software.2. Remotely - A computer user opens an e-mail attachment. The attachment, which contains a program the user wants to install, may also contain desktop monitoring software. This is described as a Trojan horse -- a desired program that contains an undesired program.Desktop monitoring programs have the ability to record every keystroke. When you are typing, a signal is sent from the keyboard to the application you are working in. This signal can be intercepted and either streamed back to the person who installed the monitoring program or recorded and sent back in a text file. The person it's sent back to is usually a system administrator. However, keystroke intercept programs are also popular among "hackers." Hackers often use desktop monitoring programs to obtain user passwords. Intercept programs, because they record keystrokes, also make users susceptible to having their credit card numbers and other sensitive personal data stolen. Employers can use the desktop monitoring program to read e-mail and see any program that is open on your screen. Desktop replicating software captures the image on the computer screen by intercepting signals that are being transmitted to the computer's video card. These images are then streamed across the network to the system administrator. Some prepackaged programs include an alert system -- when a user visits an objectionable Web site or transmits inappropriate text, the system administrator is alerted to these actions. But employers don't need to install software to track your computer use. There are actually systems built into every computer that make finding out what you've been doing pretty easy.



Kebanyakan perusahaan besar (perbankan, manufacture, institusi) mengawasi kinerja karyawannya dengan cara tersendiri, salah satu diantaranya adalah memonitoring semua aktivitas komputer yang digunakan karyawan, terutama komputer yang terhubung dengan internet. Mengapa hal ini dilakukan? Tentu saja perusahaan tidak mau rugi gara-gara karyawannya sering menggunakan komputer untuk keperluan pribadi seperti berkirim email, chatting, buka Friendster, Multiply, Facebook, Youtube, apalagi buka situs porno, dll. Jadi bagi karyawan yang tidak ingin dipecat, teliti dahulu komputer Anda sebelum menggunakannya.

Biasanya sistem administrator memasang program client berukuran kecil yang tersembunyi untuk mengirim semua aktivitas yang terjadi pada komputer untuk di kirim ke komputer administrator.

Untuk mengatasi hal tersebut berikut cara sederhana untuk mengatasinya :

  1. Restart komputer, tekan F8 sebelum masuk Windows, pilih safe mode, login sebagai administrator.
  2. Install program antispyware. Program antispyware dapat di download secara gratis melalui free.grisoft.com
  3. Jalankan program tersebut dan lakukan full scan. Program tersebut akan menganalisis adware, malware dan sebagainya yang kemudian akan menghapusnya.
  4. Lakukan update program tersebut setiap hari untuk menghindari serangan berikutnya.
  5. Jika administrator memasang perangkat keras (hardware) pada komputer untuk memonitoring, maka telitilah bagian konektor keyboard pada CPU. Biasanya sang admin memasang perangkap di bagian ini. Jika ada barang yang aneh pada bagian ini maka segera cabut untuk menghindari aksi mata-mata dari sang admin.
Berikut gambar beberapa perangkat keras untuk aksi mata-mata (spy) :






Selamat berchatting ria, buka Friendster, Multiply, Facebook, Youtube, Metacafe namun jangan lupakan tugas Anda. Selamat bekerja !!!

SHARE Facebook WhatsApp

Related Posts

Posting Komentar

Mohon gunakan Browser selain UC Browser
Untuk Mendukung Blog Ini Tetap Update.
Terimakasih