why did he use his own work computer?
Natter 70: Hookers and Blow
Off-topic discussion. Wanna talk about corsets, duct tape, or physics? This is the place. Detailed discussion of any current-season TV must be whitefonted.
why did he use his own work computer?
I suspect the only way to access the video footage was through the work network, and then he copied it onto a flash drive and sent it to Gawker from a home computer or something. But the network remembered he had accessed the footage, and that, plus his other admissions, was enough to identify him: I'm sure his dissatisfaction was no real secret.
isn't rule 1 that you access it from someone else's computer?
hasn't the guy watched "Alias?"
isn't rule 1 that you access it from someone else's computer?
Someone else's computer might not have had the access.
I work on a secure system: there are databases I can access only using my login, and which remember the last time I logged in, and for how long. When I'm away from my desk for more than five minutes, my computer goes to standby mode and only my password will restart it. If Fox has anywhere near that kind of security (and they're sufficiently paranoid I wouldn't be surprised if they did), it would be really difficult to get into a database using someone else's login.
My company just did a security review reminding people to lock their computers when stepping away. No moles sneaking into other people's systems--hopefully.
'Suela, you raise good points!
Is LA Complex the show ita ! was talking about a while back that was all addictive? It's starting on the CW in a couple of weeks.
If Fox has anywhere near that kind of security (and they're sufficiently paranoid I wouldn't be surprised if they did), it would be really difficult to get into a database using someone else's login.
Yes and no. My office has that kind of security, but since the system forces us to change our passwords so often AND you can't reuse a password that you've used in the past 24 passwords, most people have incredibly insecure passwords like "firstname1" which they can then change to "firstname2" etc up to 24 and then start over. So getting into someone else's computer is difficult only in theory.