Jun. 24th, 2010
[Locked to senior staff]
My apologies to anyone who might have been concerned over my last log. In an attempt to locate the person or persons responsible for the data corruption, I set up a fake log implying that I knew the identity of the responsible party. I left it easily hackable, and within five minutes, the contents of the log were erased and the ability to comment on the log turned off.
I managed to trace the computer activity, but by the time I arrived, whoever it was had vanished.
Thoughts? Suggested course of action?
My apologies to anyone who might have been concerned over my last log. In an attempt to locate the person or persons responsible for the data corruption, I set up a fake log implying that I knew the identity of the responsible party. I left it easily hackable, and within five minutes, the contents of the log were erased and the ability to comment on the log turned off.
I managed to trace the computer activity, but by the time I arrived, whoever it was had vanished.
Thoughts? Suggested course of action?