View Full Version : Can my school see what im looking up?
Professional Russian
March 4th, 2013, 08:03 AM
So I'm running a VPN on my phone since my school blocks just about everything. So m wondering can school see what I'm doing through VPN?(no I'm not looking up porn im still looking for my paintball shit....and my regular guns)
Infidelitas
March 4th, 2013, 09:46 AM
Unless you sign into the school network with your username and password, they shouldn't be able to trace it back to you.
Professional Russian
March 4th, 2013, 09:48 AM
Unless you sign into the school network with your username and password, they shouldn't be able to trace it back to you.
I'm going through the school network but using a VPN so can they see what I'm doing?
Blueeyes
March 4th, 2013, 04:10 PM
Well if the VPN is a split tunnel, they can see the traffic.
Depends even on what they use to monitor and how they have everything setup. If they have a packet sniffer/monitor server set up, they could possibly see what you go to.
StoppingTime
March 4th, 2013, 04:18 PM
As mentioned, it really depends on the school's network, and how everything is monitored.
But even if your web searches are tracked, it's highly unlikely someone is going to sit there looking through every student's web history.
I mean, don't go looking up porn, but that should be a given. :P
Rayquaza
March 4th, 2013, 05:45 PM
The school either monitors history through remote software, such as my school, or through internet traffic and website history via the network. It may even be both, in which case what you are seeing can be intercepted and seen through the school. And exactly as Steve said, they will only see it when they bother looking it up. It's highly unlikely that everything is logged and seen before their very lives considering the staff have jobs to do as well as the amount of students surfing the net at once.
TheMatrix
March 5th, 2013, 02:57 AM
If it's encrypted, they can't(well, they could, but it's very difficult, think NSA difficult). However, they may have some system in place that "caps" the speed on or even blocks anything it can't recognise.
unusedaccount
March 9th, 2013, 12:11 AM
This can potentially be a complex question to answer... If you are not connecting to their WiFi, then no, you have nothing to worry about. If you are connecting to one of their WiFi AP's, and RADIUS is being used for authentication (in English, you are using your school username and password to gain access) then yes, it can be traced back to you. If you are not, and they have insecure WiFi, or just WiFi with a password, then you have a chance of getting away with it. It depends what they are using for their AP's, what type of Firewall they have, and what type of Content Filtering Appliance they have. If whatever solution they have in place actively allows they to shape traffic using the Layer 7 protocol, then yes, they can trace you, even with none of your details, through your phone's DNS name (whatever you named your phone) and your phone's MAC address, which is unique, unchangeable, and can be traced back to you. Short answer? Don't do anything you wouldn't do on school computers, on your phone, if your on their WiFi, just use your Cellular Network Connection. Hope that helps. Oh, and just so you know, it was painful writing this :P I work with schools to implement modern IT solutions that actively combat the type of activity among students that your describing. :yeah: :rolleyes:
If it's encrypted, they can't(well, they could, but it's very difficult, think NSA difficult). However, they may have some system in place that "caps" the speed on or even blocks anything it can't recognise.
Encrypted means nothing, HTTPS Interception with Next Generation Firewalls, and Traffic Shaping allows Appliances to replace site SSL certs with Firewall Issues Ones, allowing the Appliance to de-crypt and analyse traffic as it enters and leaves the network. If you are on a Work or School Connection, you have no privacy, and no right to privacy. Period. :rolleyes:
ethanf93
March 9th, 2013, 12:36 AM
I do not share Eagle's sentiment above that the school would be able to snoop on PKI (e.g. HTTPS) encrypted traffic. Assuming you have not been required to install anything from the school on your device, then replacing SSL certs requires a root certificate or the device should balk with "untrusted connection."
To answer the OP question, the school will be able to see a VPN connection, but with proper steps taken to encrypt it, will not be able to see its contents.
TheMatrix
March 9th, 2013, 03:25 AM
This can potentially be a complex question to answer... If you are not connecting to their WiFi, then no, you have nothing to worry about. If you are connecting to one of their WiFi AP's, and RADIUS is being used for authentication (in English, you are using your school username and password to gain access) then yes, it can be traced back to you. If you are not, and they have insecure WiFi, or just WiFi with a password, then you have a chance of getting away with it. It depends what they are using for their AP's, what type of Firewall they have, and what type of Content Filtering Appliance they have. If whatever solution they have in place actively allows they to shape traffic using the Layer 7 protocol, then yes, they can trace you, even with none of your details, through your phone's DNS name (whatever you named your phone) and your phone's MAC address, which is unique, unchangeable, and can be traced back to you. Short answer? Don't do anything you wouldn't do on school computers, on your phone, if your on their WiFi, just use your Cellular Network Connection. Hope that helps. Oh, and just so you know, it was painful writing this :P I work with schools to implement modern IT solutions that actively combat the type of activity among students that your describing. :yeah: :rolleyes:
Sources: I has some mad IT skillz.
I hate to say this, but do you really mean what you said there?
Look back at your post. I lost count of the buzzwords and meaningless jargon.
You confused even me with all that.
Encrypted means nothing, HTTPS Interception with Next Generation Firewalls, and Traffic Shaping allows Appliances to replace site SSL certs with Firewall Issues Ones, allowing the Appliance to de-crypt and analyse traffic as it enters and leaves the network. If you are on a Work or School Connection, you have no privacy, and no right to privacy. Period. :rolleyes:
I don't think you understand encryption...
And again with the buzzwords. Cut it out. Here's the summary of what you're trying to say:
It's possible to intercept a secure communication that is encrypted, decrypt that, and then read its contents, and there's nothing you can do about it.
That's false. Read RFC 2818 (https://tools.ietf.org/html/rfc2818)(a document with the power to cure insomnia) for the specification. You're describing a man-in-the-middle attack, which most browsers warn you about. And if my favourite secure sites suddenly all had their certificates not match, then I'd be worried something was up. Which, with what you're describing, there is.
Even then, there's ways around it. One such method is double encryption, which nobody(except maybe the NSA, can't trust them) can crack.
Maybe I don't have a right to privacy when on someone else's network(the taxpayer's). But that sure as hell won't stop me from trying.
unusedaccount
March 9th, 2013, 11:42 AM
I hate to say this, but do you really mean what you said there?
Look back at your post. I lost count of the buzzwords and meaningless jargon.
You confused even me with all that.
I don't think you understand encryption...
And again with the buzzwords. Cut it out. Here's the summary of what you're trying to say:
It's possible to intercept a secure communication that is encrypted, decrypt that, and then read its contents, and there's nothing you can do about it.
That's false. Read RFC 2818 (https://tools.ietf.org/html/rfc2818)(a document with the power to cure insomnia) for the specification. You're describing a man-in-the-middle attack, which most browsers warn you about. And if my favourite secure sites suddenly all had their certificates not match, then I'd be worried something was up. Which, with what you're describing, there is.
Even then, there's ways around it. One such method is double encryption, which nobody(except maybe the NSA, can't trust them) can crack.
Maybe I don't have a right to privacy when on someone else's network(the taxpayer's). But that sure as hell won't stop me from trying.
I practically live in Computer Networks :), I know what I'm saying and I know full well what Encryption means. You, don't understand how Traffic Shaping, and Packet Manipulation works with School Edge Appliances. You have no right to privacy, and no right to access anything they don't want you to access, when you are on their network. Simple as. Oh, and no... I'm not describing a man in the middle attack, the fact that you've said that proves you don't understand what I'm trying to say, we are talking about SSL Interception before it reaches the clients machine/device, a man in the middle attack is UNAUTHORIZED, SSL Interception by means of Layer 7, and Firewall Appliances, is not Unauthorized, it'll be in the IT User Agreement you sign when you start at the school. An Attack? No. A lawful interception of data flowing in and out of a school network, by authorized IT staff? Yes... One last thing, 'think NSA difficult'? You'd be surprised what you can do with a few powerful computers and a brain... All that is needed to understand what I'm saying, is basic understanding of Encryption, and the OSI model.
I do not share Eagle's sentiment above that the school would be able to snoop on PKI (e.g. HTTPS) encrypted traffic. Assuming you have not been required to install anything from the school on your device, then replacing SSL certs requires a root certificate or the device should balk with "untrusted connection."
To answer the OP question, the school will be able to see a VPN connection, but with proper steps taken to encrypt it, will not be able to see its contents.
Correct! :) The cert is unauthorized, but to continue to the site, the user will have to accept the connection, and accept the unauthorized cert, which allows the Appliance to snoop traffic, if they don't accept the connection, then they cannot continue. Any School Firewall which actively allows students to use Tor, VPN or a Proxy, isn't configured correctly.
I won't bore you with the unnecessary details... But to prove my point, look at this. (Below)
"SSL Filtering
SSL interception ensures that Internet traffic using secure connections (SSL/HTTPS) is also analysed and scanned for threats and inappropriate content. Flexible policy rules enable known financial institutions to be whitelisted."
Source from http://www.smoothwall.net/product-library/guardian-web-filter/
Before you say, well... This is just one product... All Next Gen Firewalls and Filters support this, not just Smoothwall. =]
ethanf93
March 9th, 2013, 12:21 PM
Traffic shaping: http://en.wikipedia.org/wiki/Traffic_shaping Traffic shaping has nothing to do with encryption.
Regarding your comments as to 'NSA difficult':
Are you telling me you've broken SSL/TLS? Really? Prove it. That is a very serious claim.
What you are describing is a MITM attack and will only succeed if the user either (a) installs a cert from the school on their device or (b) the school somehow obtains a root cert (your school is run by the NSA or the Chinese government?)
TheMatrix
March 9th, 2013, 01:36 PM
Regarding your comments as to 'NSA difficult':
Are you telling me you've broken SSL/TLS? Really? Prove it. That is a very serious claim.
I haven't, but I wouldn't be surprised if the NSA can crack any encryption algorithm easily. They won't admit that, obviously.
It's just another of my conspiracy theories.
What you are describing is a MITM attack and will only succeed if the user either (a) installs a cert from the school on their device
Which is something I probably wouldn't do.
(b) the school somehow obtains a root cert (your school is run by the NSA or the Chinese government?)
Well, no, not that I know of.
Surely nothing is impossible, and that's one of the possibilities.
You should try it sometime, EagleOneSix. Try to use various ways of accessing secure sites, then look at your fancy Appliances and whatnot, and see if the original contents are there to see. Try using Tor, and see if any of that is visible.
My school has none of that, which is a good thing, I guess. Unsurprising, though, for a school where the administrator password for all of the Macintosh computers was "donttell" for the longest time. I had hoped people knew better here, in the heart of the Silicon Valley. Apparently not.
unusedaccount
March 9th, 2013, 01:37 PM
Traffic shaping: http://en.wikipedia.org/wiki/Traffic_shaping Traffic shaping has nothing to do with encryption.
Regarding your comments as to 'NSA difficult':
Are you telling me you've broken SSL/TLS? Really? Prove it. That is a very serious claim.
What you are describing is a MITM attack and will only succeed if the user either (a) installs a cert from the school on their device or (b) the school somehow obtains a root cert (your school is run by the NSA or the Chinese government?)
You don't understand what I'm saying, and yes Traffic Shaping does indirectly affect how you use School Networks. It isn't directly related to Encryption, but it serves as a vital tool to monitor what students do, and ensure that they don't abuse the connection. In regards to me breaking SSL/TLS? Haha... I wish :) But no, and you are taking what I say the wrong way. When you are behind a School Network, you are on their turf, most schools, especially in the U.S, use 'Next-Generation Firewalls' (industry naming, not mine), which allow them to inspect traffic as it goes in and out of the network. I am not describing a man in the middle attack, because it is not an attack, you are on their turf, they have every right to snoop you. When issues certificated are replaced or 'injected' by a school firewall, the firewall is able to decrypt and analyse the traffic passing through. The working are hard to explain, to someone that has no prior experience, or knowledge of how Networks work, beyond maybe setting up a a home network. What you are not understanding, is that there is no need to 'break' or 'hack', 'SSL/TLS' as you put it, because it is already freely accessible, due to the temp swap of issued certs, for certs issues by the appliance your passing through. MITM is something totally different. It is a man in the middle, as such, because a school edge appliance is between you, and the website/service your trying to contact, but it is not an attack. The very fact that you he is able to open a VPN connection, in school, on their connection (if he's using Cellular, then this doesn't' apply, obviously...) screams to me that something is wrong, in the way his school has their appliance configured, any well configured Firewall Appliance at a Network Edge, blocks anonymising services, like Tor, VPN, and proxy websites (through keyword inspection, and pre-defined blacklists). If he is able to open a VPN connection on their network, then good for him, the point I'm trying to ultimately pass to you, is that, if you don't want your school to see what your doing, don't use their connection... You have no privacy, and no right to privacy, when using their Internet Services. Never assume, what you are doing is untraceable, or anonymising. Oh, one last thing, in terms of Traffic Shaping and Layer 7, as I said, because you don't understand them, it seems like I'm speaking another language, Layer 7, and Traffic Shaping are used to account for traffic that passes in and out of the Network. They effectively allow the IT Staff to allow certain types of traffic through, block certain types of traffic, and trace traffic back to devices to see who's abusing the connection. For example, allowing or blocking Siri, on an iPhone, or blocking the App Market. In terms of VPN, it basically allows them to see what type of traffic is coming in and out of the network, how much bandwidth it's using, it can be used to predict what it's being used for, and it shows which device it's coming from, down to a name, like: Steven'sIphone, or Jason'sDroid. It's all about accountability, they don't need to know what your doing, they can still trace it back, and catch you rather easily. For anyone that knows what I'm talking about, you'll understand this one word inside joke... Meraki
My school has none of that, which is a good thing, I guess. Unsurprising, though, for a school where the administrator password for all of the Macintosh computers was "donttell" for the longest time. I had hoped people knew better here, in the heart of the Silicon Valley. Apparently not.
Then your a very lucky person. =] What I'm saying is only valid for the majority of K1-18 Institutions, who do employ solutions to ensure Students don't abuse the connections offered by the School/Institution/District/State.
ethanf93
March 9th, 2013, 02:12 PM
Eagle:
I never stated it would be anonymizing, I said the school would not be able to inspect the contents of the connection.
Please explain exactly how the school would come up with a valid certificate for, say, google.com.
As for your implication that I don't know what the OSI layers are, what traffic shaping is, or that I don't know what DPI is, I am indeed aware of what they are. They have nothing to do with this because the school would only see an encrypted stream.
Edit:
One last thing, 'think NSA difficult'? You'd be surprised what you can do with a few powerful computers and a brain... All that is needed to understand what I'm saying, is basic understanding of Encryption, and the OSI model.
Please back this statement up.
Edit 2: To specifically address the OP's question: No. The school will see a connection to the VPN remote host. Rayquaza is correct below.
Rayquaza
March 9th, 2013, 02:22 PM
I need to clear some things up a little, I've been watching this thread for some time now and the terms being used are getting overly-complicated for the OPs actual question.
If all of the data is encrypted before it reaches the school gateway to the internet, it cannot be decrypted (or is very hard to), that's it. No traffic shaping, no packet manipulation, nothing.
If data is not encrypted and is only encrypted after it leaves the school's LAN/CAN, it can be looked up with ease, along with the school having legal rights to do so as mentioned above where the user has given permission when they have joined the school under a contract/agreement.
If data is encrypted to the extent in which it requires further encryption as it leaves the school about to pass it's gateway, it can also be traced back. The packets will have their destination on the outside, and will be logged. These destinations can be then looked up via a DNS to track back the site in which requests were made to.
There is a lot of over complication here where it needn't be. Not only is the OP frozen (in which case these answers may not even be read), you haven't attempted to help solve his problem as it is based around the OPs VPN, not the school network. They want to trace the requests being sent to the website, not the actual data being uploaded. But either way, this is still in the form of packets.
unusedaccount
March 9th, 2013, 03:01 PM
I need to clear some things up a little, I've been watching this thread for some time now and the terms being used are getting overly-complicated for the OPs actual question.
If all of the data is encrypted before it reaches the school gateway to the internet, it cannot be decrypted (or is very hard to), that's it. No traffic shaping, no packet manipulation, nothing.
If data is not encrypted and is only encrypted after it leaves the school's LAN/CAN, it can be looked up with ease, along with the school having legal rights to do so as mentioned above where the user has given permission when they have joined the school under a contract/agreement.
If data is encrypted to the extent in which it requires further encryption as it leaves the school about to pass it's gateway, it can also be traced back. The packets will have their destination on the outside, and will be logged. These destinations can be then looked up via a DNS to track back the site in which requests were made to.
There is a lot of over complication here where it needn't be. Not only is the OP frozen (in which case these answers may not even be read), you haven't attempted to help solve his problem as it is based around the OPs VPN, not the school network. They want to trace the requests being sent to the website, not the actual data being uploaded. But either way, this is still in the form of packets.
VPN, a tunnel which is achieved through use of the School Network. Packets, which can be inspected using DPI. No Traffic Shaping? All Traffic is shaped, how it is shaped, is relative to the situation being discussed. There is no further encryption, as it leaves the school network. To understand what I'm saying, requires prior knowledge of how networks work. I apologize for confusing anyone. At the end of the day, one thing remains, and is clear... If you don't want the school to see what your looking at, then don't use their connection for your personal online activities. I'm going to stop monitoring this thread now, before it drags on further.
Rayquaza
March 9th, 2013, 03:09 PM
VPN, a tunnel which is achieved through use of the School Network. Packets, which can be inspected using DPI. No Traffic Shaping? All Traffic is shaped, how it is shaped, is relative to the situation being discussed. There is no further encryption, as it leaves the school network. To understand what I'm saying, requires prior knowledge of how networks work. I apologize for confusing anyone. At the end of the day, one thing remains, and is clear... If you don't want the school to see what your looking at, then don't use their connection for your personal online activities. I'm going to stop monitoring this thread now, before it drags on further.
FYI; I do have prior knowledge to how networks work. The "Traffic Shaping" occurs through the ISP of the school, not the school itself. What do you mean there is no encryption as it leaves the network? Did you seriously just say that? Wow. if that was the case, packets of data could be intercepted and read with ease. DPI is an un-needed term, the school already has access to the destination of the packets to find out history.
Blueeyes
March 9th, 2013, 04:07 PM
Ok this has been getting a little out of hand. His original question, correct me if i'm wrong, was if the school could see what hes looking up. Assuming the following things;
Using a VPN on his personal computer
On the school network, WLAN or LAN connection.
So in a 1 word answer, Yes they can.
But unfortunately it goes back how they have everything set up. I know for a fact our school uses a OpenDNS + packet sniffer solution.. simply because I assisted in setting it up. OpenDNS acts as the filter, (realtime blocking) and the packet sniffer basically is a server which runs 24/7 and logs packets. So, if we do see anything suspicious under OpenDNS logs, we can fire up the packet sniffer and trace the computer. Now, that doesn't apply for all school networks. This is just how I know ours is setup.
unusedaccount
March 9th, 2013, 04:16 PM
OpenDNS is great. They can be a pain for environments that have BYOD policies though. :/
unusedaccount
March 9th, 2013, 06:33 PM
FYI; I do have prior knowledge to how networks work. The "Traffic Shaping" occurs through the ISP of the school, not the school itself. What do you mean there is no encryption as it leaves the network? Did you seriously just say that? Wow. if that was the case, packets of data could be intercepted and read with ease. DPI is an un-needed term, the school already has access to the destination of the packets to find out history.
Traffic Shaping is done by ISP's, correct. But it is also often done by schools, to stop students abusing the connection. Encryption as data leaves the network? Yes. Added or injected encryption by a schools firewall? No... If the data isn't encrypted, using SSL/TLS when it leaves the students computer, the firewall won't magically encrypt it. Prior knowledge of networks? If you have prior knowledge of working with, and on Corporate Networks, which is technically what a School is, a company... You'd be aware that many K1-18's use DPI at the Edge, either by means of an Appliance, or Software, to see look for malicious keywords and actively seek out new sites/services to block. Not to seem rude or anything, but I do this for a living, so I do know what I'm talking about, I have every respect for what you've suggested, but have you ever worked in a School? Have you ever Administered an Edge Firewall? Or have you ever designed a Network? Maybe you could stop attacking what I'm saying, and just leave it. =] Also, you said the school has no need for DPI? It isn't about tracking what students do... It's about Process Automation... Blocking on the fly, and dynamically stopping students accessing websites/services that are inappropriate, with DPI, Firewalls can analyse traffic and make behavioral changes by themselves, without need for human input. Dynamic Content Blocking, effectively. Oh, one last thing, just as a prudent example from a product that is far from as advanced as an Enterprise Grade Firewall, http://www.youtube.com/watch?v=9418uUvrMmQ If pfSense can shape traffic... School Firewalls can.
Rayquaza
March 9th, 2013, 06:53 PM
Traffic Shaping is done by ISP's, correct. But it is also often done by schools, to stop students abusing the connection. Encryption as data leaves the network? Yes. Added or injected encryption by a schools firewall? No... If the data isn't encrypted, or using SSL/TLS when it leaves the students computer, the firewall won't magically encrypt it. Prior knowledge of networks? If you have prior knowledge of working with, and on Corporate Networks, which is technically what a School is, a company... You'd be aware that many K1-18's use DPI at the Edge, either by means of an Appliance, or Software, to see look for malicious keywords and actively seek out new sites/services to block. Not to seem rude or anything, but I do this for a living, so I do know what I'm talking about, I have every respect for what you've suggested, but have you ever worked in a School? Have you ever Administered an Edge Firewall? Or have you ever designed a Network? Maybe you could stop attacking what I'm saying, and just leave it. =] Also, you said the school has no need for DPI? It isn't about tracking what students do... It's about Process Automation... Blocking on the fly, and dynamically stopping students accessing websites/services that are inappropriate, with DPI, Firewalls can analyse traffic and make behavioral changes by themselves, without need for human input. Dynamic Content Blocking, effectively. Oh, one last thing, just as a prudent example from a product that is far from as advanced as an Enterprise Grade Firewall, http://www.youtube.com/watch?v=9418uUvrMmQ If pfSense can shape traffic... School Firewalls can.
Once again you're waffling. I only read the first two lines as they were relevant, and also, I never said it was added through the firewall, so can you stop making things up please.
Traffic Shaping may be done with schools but it is more likely that the entire bandwidth is being shared across the establishment.
unusedaccount
March 9th, 2013, 06:58 PM
Once again you're waffling. I only read the first two lines as they were relevant, and also, I never said it was added through the firewall, so can you stop making things up please.
Traffic Shaping may be done with schools but it is more likely that the entire bandwidth is being shared across the establishment.
It's not my fault you don't understand the relatively simple terms I'm using to get my point across. Entire Bandwidth being shared? Haha... No QoS? What are we in? 1997? :yeah: Almost all Networks, even home network nowadays have some sort of shaping to give priority to some services over others... Remote VDI in schools, over Webmail for example. Local Media, over Torrents in homes, for example... Please stop attacking what I'm saying :wub:
StoppingTime
March 9th, 2013, 07:00 PM
It's not my fault you don't understand the relatively simple terms I'm using to get my point across. Entire Bandwidth being shared? Haha... No QoS? What are we in? 1997? :yeah: Almost all Networks, even home network nowadays have some sort of shaping to give priority to some services over others... Remote VDI in schools, over Webmail for example. Local Media, over Torrents in homes, for example... Please stop attacking what I'm saying :wub:
You're overcomplicating things and you know it. Instead of directly answering the OP and giving him an answer he can understand, you throw all these terms around which likely have nothing to do with the actual question, just to make yourself look like you know what you're saying. There's really no reason for this, and it's derailing the original purpose of this thread.
Rayquaza
March 9th, 2013, 07:06 PM
It's not my fault you don't understand the relatively simple terms I'm using to get my point across. Entire Bandwidth being shared? Haha... No QoS? What are we in? 1997? :yeah: Almost all Networks, even home network nowadays have some sort of shaping to give priority to some services over others... Remote VDI in schools, over Webmail for example. Local Media, over Torrents in homes, for example... Please stop attacking what I'm saying :wub:
Im not attacking what you're saying. I'm saying you're pointlessly adding jargon and buzzwords, and what you're saying is almost entirely incorrect. Home networks give priority? Wow, because we have a server in out house that allocates data to computers, right.
If you mean ISPs allocate a certain amount of speed/usage limit etc, you would be correct, a network itself is just a connection with computers, it would be down to users manually setting those, not automatic like you are inferring.
You haven't got a point you're getting across. First you're talking about the Application Layer being in charge of encryption (Or Layer 7 as you like to call it), then you're talking about packet modifications and traffic shaping and now you're talking about Firewalls. You've completely lost me as well as the original answer to the question asked by the OP.
unusedaccount
March 9th, 2013, 07:07 PM
You're overcomplicating things and you know it. Instead of directly answering the OP and giving him an answer he can understand, you throw all these terms around which likely have nothing to do with the actual question, just to make yourself look like you know what you're saying. There's really no reason for this, and it's derailing the original purpose of this thread.
I'm using IT terms to get my point across. If someone doesn't understand something I am saying, they can use Google. Perhaps if other people who are posting in this thread accepted what I'm saying, instead of trying to seem like experts and pick at what I post, when really they have no experience or knowledge relating to the OP's question, then I wouldn't have to constantly justify myself.
Im not attacking what you're saying. I'm saying you're pointlessly adding jargon and buzzwords, and what you're saying is almost entirely incorrect. Home networks give priority? Wow, because we have a server in out house that allocates data to computers, right.
If you mean ISPs allocate a certain amount of speed/usage limit etc, you would be correct, a network itself is just a connection with computers, it would be down to users manually setting those, not automatic like you are inferring.
You haven't got a point you're getting across. First you're talking about the Application Layer being in charge of encryption (Or Layer 7 as you like to call it), then you're talking about packet modifications and traffic shaping and now you're talking about Firewalls. You've completely lost me as well as the original answer to the question asked by the OP.
Jargon and Buzzwords? As I said, use Google?... If you had any experience working with Networks, you'd know and understand the terms I'm using. Layer 7 isn't in charge of encryption, but it is in-directly related to the accountability of bandwidth... Being able to shape traffic based upon policy, and such... And again, why are you attacking what I say? Have you ever worked with Firewalls, or Edge Appliances? *cough* no. You have no experience with the kind of protocols, and equipment I'm talking about. If you doubt anything I say, then you could always give Palo Alto Networks, Smoothwall, SonicWall, or Fortigate a call, or drop them an email, and ask them how Firewall Appliances work. =]
StoppingTime
March 9th, 2013, 07:09 PM
I'm using IT terms to get my point across. If someone doesn't understand something I am saying, they can use Google. Perhaps if other people who are posting in this thread accepted what I'm saying, instead of trying to seem like experts and pick at what I post, when really they have no experience or knowledge relating to the OP's question, then I wouldn't have to constantly justify myself.
You're using terms which are unrelated to the original question, as other members have explained in depth. Nobody is going to sit back and let you dictate what's right and wrong, especially given the fact that you are wrong in a number of areas, as other members have said, once again. If you're only going to continue posting in order to "justify yourself" there's no point to post, and it's certainly not what this thread is for.
unusedaccount
March 9th, 2013, 07:16 PM
You're using terms which are unrelated to the original question, as other members have explained in depth. Nobody is going to sit back and let you dictate what's right and wrong, especially given the fact that you are wrong in a number of areas, as other members have said, once again. If you're only going to continue posting in order to "justify yourself" there's no point to post, and it's certainly not what this thread is for.
What's wrong with suggesting corrections to assumptions people have? Steven, do, please, post something that I've said that's wrong... I'm not dictating, I'm speaking from having real word experience, certifications, and knowledge in IT. Please just lock this... It's getting a little annoying. :rolleyes: Perhaps we can just agree to disagree.
Rayquaza
March 9th, 2013, 07:19 PM
I'm using IT terms to get my point across. If someone doesn't understand something I am saying, they can use Google. Perhaps if other people who are posting in this thread accepted what I'm saying, instead of trying to seem like experts and pick at what I post, when really they have no experience or knowledge relating to the OP's question, then I wouldn't have to constantly justify myself.
Jargon and Buzzwords? As I said, use Google?... If you had any experience working with Networks, you'd know and understand the terms I'm using. Layer 7 isn't in charge of encryption, but it is in-directly related to the accountability of bandwidth... Being able to shape traffic based upon policy, and such... And again, why are you attacking what I say? Have you ever worked with Firewalls, or Edge Appliances? *cough* no. You have no experience with the kind of protocols, and equipment I'm talking about. If you doubt anything I say, then you could always give Palo Alto Networks, Smoothwall, SonicWall, or Fortigate a call, or drop them an email, and ask them how Firewall Appliances work. =]
In case you have not noticed, VT is a help site. The OP could have used Google himself, so you chucking a load of buzzwords around, making other members feel inferior to what you say and then having the cheek to ask people to Google your waffle is incredibly counter productive. As for your answer jumps around the place, it's pretty much void. The OP basically asked for a yes or no answer, what you did was post lenghty paragraphs with no conclusion and then accuse us of it apparently being our 'fault' that we do not understand your jargon. Im not attacking what I say, and I think other members of this site can agree, this is not an attack, merely a correction. You're asking me to give a call when I am already familiar with such terminology. Why don't you just tell the OP if his sites are or are not going to be tracked, since that's all he's asking for, really.
unusedaccount
March 9th, 2013, 07:23 PM
In case you have not noticed, VT is a help site. The OP could have used Google himself, so you chucking a load of buzzwords around, making other members feel inferior to what you say and then having the cheek to ask people to Google your waffle is incredibly counter productive. As for your answer jumps around the place, it's pretty much void. The OP basically asked for a yes or no answer, what you did was post lenghty paragraphs with no conclusion and then accuse us of it apparently being our 'fault' that we do not understand your jargon. Im not attacking what I say, and I think other members of this site can agree, this is not an attack, merely a correction. You're asking me to give a call when I am already familiar with such terminology. Why don't you just tell the OP if his sites are or are not going to be tracked, since that's all he's asking for, really.
You don't understand my 'jargon'. So you attack me, because I make you feel inferior? Dude...... Some people are good at Math, some people are good with Planes, some people are good with Art, and some people are good with IT. I certainly wasn't trying to make anyone feel inferior... Ending this, simply. The answer is YES. The School can see what he's doing, or 'could' if they wanted too. Happy now? Can we leave this now please.
StoppingTime
March 9th, 2013, 07:26 PM
OP Requested. :locked:
vBulletin® v3.8.9, Copyright ©2000-2021, vBulletin Solutions, Inc.