|
Registered
Join Date: Dec 1969
Location: chula vista ca usa
Posts: 5,728
|
Thanks for another item to use in my computer security classes. If it were me I would find out who did it, why they did it, how were they allowed access to the system level so the program could be deleted and finally what rules are in place to keep the toys secured. Do they get locked up, taken home, surf the web at lunch time or, or, or?
|