Sending mail (invisibly) from inside a Mac LC app
prothero at earthednet.org
Wed Apr 2 03:02:32 CEST 2014
In 100% agreement.
> On Apr 1, 2014, at 5:27 PM, Bob Sneidar <bobsneidar at iotecdigital.com> wrote:
> To play the Devil’s advocate so to speak, we had people downloading and installing wares and peer to peer software, and then sharing illegal copies of movies with others out of our high speed corporate network. We told them not to. Over and over again. They kept doing it anyway. This got found out, of course, since there are bots looking for people doing this very thing.
> Now the producers of said pirated copyrighted material did not approach the people doing it. They did not approach the company I was working for. They approached the ISP and DEMANDED that the ISP block all outbound and inbound traffic from us! Thankfully, the ISP was more sensible than that, and alerted us that we had to find and resolve the issue, prove we had done so, then submit our findings, after which they would alert the concerned party.
> All that to say this: Users have absolutely NO COMPUNCTION WHATSOEVER about jeopardizing the corporate network using the companies own equipment. Therefore, it remains the companies responsibility and obligation to protect itself by monitoring what is going into and out of computers that belong to the company. Period.
> We did after all, have each employee sign an Acceptable Use policy telling them that any and all information stored on the companies computers was subject to viewing by authorized personnel. Not only that, but our content management software would log attempts to access blacklisted websites, so let’s not pretend this is not happening ALL THE TIME. Data is being collected on all of us everywhere, not just by the companies we work for, but by our ISP’s, our mail providers, our search engines and our frigging location services on our cell phones for crying out loud. And that is our PERSONAL computers!
> I think being upset about this is much ado about nothing.
>> On Mar 28, 2014, at 14:41 , Richard Miller <wow at together.net> wrote:
>> Fascinating responses here. Quite a spin folks are putting on my message without even asking first.
>> The program is looking for signs of system failure on the Mac, before drives crash or other problems get out of hand.
>> Nothing to do with the user.
>>> On 3/28/14 5:23 PM, stephen barncard wrote:
>>> secret collection is the devil.
>>> *Stephen Barncard - San Francisco Ca. USA - Deeds Not Words*
>>>> On Fri, Mar 28, 2014 at 2:17 PM, John Dixon <dixonja at hotmail.co.uk> wrote:
>>>> Not nice...:-(
>>>>> Richard Miller <wow at together.net> wrote:
>>>>> I have a Mac-only LC program that runs invisibly in the background. This
>>>>> used in a corporate environment, so the actual user of the Mac computer
>>>>> not likely even know it is running. It is designed to collect certain
>>>>> and send it to management.
>>>> use-livecode mailing list
>>>> use-livecode at lists.runrev.com
>>>> Please visit this url to subscribe, unsubscribe and manage your
>>>> subscription preferences:
>>> use-livecode mailing list
>>> use-livecode at lists.runrev.com
>>> Please visit this url to subscribe, unsubscribe and manage your subscription preferences:
>> use-livecode mailing list
>> use-livecode at lists.runrev.com
>> Please visit this url to subscribe, unsubscribe and manage your subscription preferences:
> use-livecode mailing list
> use-livecode at lists.runrev.com
> Please visit this url to subscribe, unsubscribe and manage your subscription preferences:
More information about the use-livecode