+ Post New Thread
Page 3 of 3 FirstFirst 123
Results 31 to 34 of 34
Network and Classroom Management Thread, Securus in Technical; You know the time of the posting from the proxies access log (see my previous post). You can read the ...
  1. #31

    Geoff's Avatar
    Join Date
    Jun 2005
    Location
    Fylde, Lancs, UK.
    Posts
    11,800
    Thank Post
    110
    Thanked 582 Times in 503 Posts
    Blog Entries
    1
    Rep Power
    223

    Re: Securus

    You know the time of the posting from the proxies access log (see my previous post). You can read the forum thread. Each post has a time associated with it. Therefore you can work out which post is theirs.

  2. #32

    Join Date
    Jul 2006
    Location
    Bucks, UK
    Posts
    120
    Thank Post
    0
    Thanked 0 Times in 0 Posts
    Rep Power
    0

    Re: Securus

    But you still don't get PMs and there are things where they are likely to confide in one or two people they know from the board. We already know their user names so we can monitor their postings with ease.

  3. #33

    Geoff's Avatar
    Join Date
    Jun 2005
    Location
    Fylde, Lancs, UK.
    Posts
    11,800
    Thank Post
    110
    Thanked 582 Times in 503 Posts
    Blog Entries
    1
    Rep Power
    223

    Re: Securus

    That's not a big deal either. It's just a case of cross referencing the url with the squid store.log and pulling the relevant items from the on disk cache.

  4. #34
    ICTNUT's Avatar
    Join Date
    Jul 2005
    Location
    Hereford
    Posts
    1,414
    Thank Post
    193
    Thanked 247 Times in 120 Posts
    Rep Power
    61

    Re: Securus

    I have to agree with Geoff on this.

    Yes we all want to ensure that those at risk are monitored and reported to the correct teams but at a cost of 3, 4 or 5k is way to high when you can do it for free with the tools you most likely have already.

    Yes Securus does some ofthe work for you but you still have to go through the logs to get, the screenshots, you need.

    I currently use 3 layers of content filtering DansGuardian, ISA 2004, and a Bloxx appliance all of which give me all the information I need when I cross refernece the custom logon database I have for students logon/logoof activity.

    This allows me to pinpoint and confirm exactly who accessed what, from where and when.

    OK so i don't have a screenshot to go with it but the proof is there, and anyway just becouse you have a screenshot does not mean anything more than if you don't, students will always claim that someone used thier logon details to try and get out of it.

SHARE:
+ Post New Thread
Page 3 of 3 FirstFirst 123

Similar Threads

  1. Securus
    By krisd32 in forum Windows
    Replies: 19
    Last Post: 2nd March 2009, 03:43 PM
  2. securus
    By Chris in forum Wireless Networks
    Replies: 56
    Last Post: 7th April 2007, 10:10 AM
  3. Securus on the BBC
    By Netman in forum IT News
    Replies: 3
    Last Post: 20th January 2006, 10:53 AM
  4. Securus
    By eejit in forum Windows
    Replies: 42
    Last Post: 24th November 2005, 03:26 PM

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •