Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It doesn't have to be some elaborate audit functionality. Every reasonable internal application has to have access control and at least some basic logging in place. Based just on that you can already infer a lot.


Isn't that why you walk over to someone's random unlocked workstation and take the screenshot from there?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: