Quote:
Originally Posted by AmericanGeisha
use a proxy
|
Yep, but you have to make sure you use an encrypted proxy. For instance tunneling over SSH, VPN, etc... Otherwise if it's just a socks proxy or http proxy or web proxy you're not safe. The network admin and even other people on the network (if they have tech skills) can intercept your traffic to the proxy and see what you're doing. If the traffic is encrypted then they just get encrypted junk traffic between you and the proxy. Though the proxy does always help mask your identify from the site you're accessing, which is perhaps 1/2 the battle. I really recommend a proper tunnel like VPN, but even then a keylogger is an issue if you're not the only one with a key to your office and especially if you're not the one who setup the computer.