this post was submitted on 27 Sep 2023
104 points (94.8% liked)

Asklemmy

43148 readers
2227 users here now

A loosely moderated place to ask open-ended questions

Search asklemmy 🔍

If your post meets the following criteria, it's welcome here!

  1. Open-ended question
  2. Not offensive: at this point, we do not have the bandwidth to moderate overtly political discussions. Assume best intent and be excellent to each other.
  3. Not regarding using or support for Lemmy: context, see the list of support communities and tools for finding communities below
  4. Not ad nauseam inducing: please make sure it is a question that would be new to most members
  5. An actual topic of discussion

Looking for support?

Looking for a community?

~Icon~ ~by~ ~@Double_[email protected]~

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 46 points 11 months ago* (last edited 11 months ago) (2 children)

Coworker (IT guy) went into a meeting room, turned on the computer, but not the monitor, and then returned to his office. Then he waited for another co-worker to enter the meeting room. The IT guy then remotely connected to the meeting room computer from his desk, logging in as the person in the meeting room - no idea how he got the password. He then made some very strange modifications to seemingly random employees time sheets and left a homophobic email in the drafts of a lesbian co-worker. Then he tried to cover his tracks by erasing some logs, logged out, and went on his merry way.

The changes were noticed the same day and I was asked to investigate. The only reason I looked thoroughly enough to figure it out was because the logs were erased, otherwise I probably would have stopped digging once the CCTV footage and time sheet modification logs matched up. He forgot to wipe the logs of his own machine showing the remote connection to the meeting room PC just before the changes were made. I was digging through his computer’s logs while sitting across from him, it was a bit surreal.

From what I heard, he gave no reason for why he did what he did. I don’t think he really had one.

[–] [email protected] 20 points 11 months ago (2 children)

What an absolute piece of shit. Could of destroyed someone's life. I wonder if that was the first time.

[–] [email protected] 13 points 11 months ago (2 children)

"Of" never follows could/should/would. Ever.

[–] [email protected] 4 points 11 months ago (1 children)

Should "of" ever follow "would" or "could"?

[–] [email protected] 9 points 11 months ago

It could, of course, be done. If you ignored punctuation.

[–] [email protected] 3 points 11 months ago

Yeah to be honest I don't know why I write it like that. I know it's not right, outlook corrects me almost every day. One of those weird things my brain does, maybe a habit from when I was a kid idk. I do it without realizing.

[–] [email protected] 8 points 11 months ago

To extend what TheGreenGolem said, what you have understood as "could of" is actually a contraction of the words "could" and "have" into "could've"

[–] [email protected] 7 points 11 months ago (2 children)

Weird.

Also, I thought the whole point of logs is that you can't delete them yourself. They get written to an external place and then they can't be edited.

[–] [email protected] 7 points 11 months ago

Most users can’t clear their computer logs, but IT techs have a lot more access. I haven’t ever worked somewhere that has any kind of logs that nobody can wipe/delete, IT staff kind of need to be trusted or they can do all sorts of chaos and damage.

[–] [email protected] 4 points 11 months ago

You're thinking of audit logs, few systems are critical enough to warrant that, no system mentioned in the story would typically have audit logs unless we're talking in the military or similar.