Quote:
Originally Posted by john rogers
Thanks for another item to use in my computer security classes. If it were me I would find out who did it, why they did it, how were they allowed access to the system level so the program could be deleted and finally what rules are in place to keep the toys secured. Do they get locked up, taken home, surf the web at lunch time or, or, or?
|
That is just what they are, toys!