Re: so, shall we get started?

gt5139c@prism.gatech.edu
Wed, 24 Aug 94 10:38:36 EDT

> Also, in most corprate settings and many
> or all govt settings, the computer facility
> is only for official use.  Also, gathering

I guess I don't need to tell you that if this policy
were enforced (or enforcable) there'd be a big stink
when it discovered what the portions of resource usage
was for "officially sanctioned use."

> statistics, while allowing some understanding
> of a user's behavior, does not mean reading
> their email or contents of files.

This is true--I presume you're talking about thing
like average online time / week, use of various
specialized resources (why is this person who 
usually just reads email suddenly telneting to
hosts all over the Internet?), &c.

I had the thought of changing commonly abused
commands (ls, rm, &c.) to locally known aliases.
The original command names are compiled programs
which log a possible anomaly, and then run the 
aliased program.

Crude--but could it be effective?

--Pete