this post was submitted on 27 Sep 2023
105 points (94.9% liked)

Asklemmy

43831 readers
1103 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_A@discuss.tchncs.de~

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] Blake@feddit.uk 46 points 1 year ago* (last edited 1 year ago) (2 children)

Coworker (IT guy) went into a meeting room, turned on the computer, but not the monitor, and then returned to his office. Then he waited for another co-worker to enter the meeting room. The IT guy then remotely connected to the meeting room computer from his desk, logging in as the person in the meeting room - no idea how he got the password. He then made some very strange modifications to seemingly random employees time sheets and left a homophobic email in the drafts of a lesbian co-worker. Then he tried to cover his tracks by erasing some logs, logged out, and went on his merry way.

The changes were noticed the same day and I was asked to investigate. The only reason I looked thoroughly enough to figure it out was because the logs were erased, otherwise I probably would have stopped digging once the CCTV footage and time sheet modification logs matched up. He forgot to wipe the logs of his own machine showing the remote connection to the meeting room PC just before the changes were made. I was digging through his computer’s logs while sitting across from him, it was a bit surreal.

From what I heard, he gave no reason for why he did what he did. I don’t think he really had one.

[–] Plibbert@lemmy.ml 20 points 1 year ago (2 children)

What an absolute piece of shit. Could of destroyed someone's life. I wonder if that was the first time.

[–] TheGreenGolem@lemm.ee 13 points 1 year ago (2 children)

"Of" never follows could/should/would. Ever.

[–] cowfodder@unilem.org 4 points 1 year ago (1 children)

Should "of" ever follow "would" or "could"?

[–] rooster_butt@lemm.ee 9 points 1 year ago

It could, of course, be done. If you ignored punctuation.

[–] Plibbert@lemmy.ml 3 points 1 year ago

Yeah to be honest I don't know why I write it like that. I know it's not right, outlook corrects me almost every day. One of those weird things my brain does, maybe a habit from when I was a kid idk. I do it without realizing.

[–] OhTheMoose@lemm.ee 8 points 1 year ago

To extend what TheGreenGolem said, what you have understood as "could of" is actually a contraction of the words "could" and "have" into "could've"

[–] radix@lemm.ee 7 points 1 year ago (2 children)

Weird.

Also, I thought the whole point of logs is that you can't delete them yourself. They get written to an external place and then they can't be edited.

[–] Blake@feddit.uk 7 points 1 year ago

Most users can’t clear their computer logs, but IT techs have a lot more access. I haven’t ever worked somewhere that has any kind of logs that nobody can wipe/delete, IT staff kind of need to be trusted or they can do all sorts of chaos and damage.

[–] ninjan@lemmy.mildgrim.com 4 points 1 year ago

You're thinking of audit logs, few systems are critical enough to warrant that, no system mentioned in the story would typically have audit logs unless we're talking in the military or similar.