Search for network monitoring programs,find identity with whois software ,control acces and analyze activity.