Comment MBR virus (Score 1) 366
Create a virus that overwrites the MBR making the computer non-bootable.
In response -- spurred in part by stricter regulatory, legal and compliance requirements -- organizations are not only filtering and blocking Web sites and scanning e-mail. Many are also watching what employees post on social networks and blogs, even if it's done from home using noncompany equipment.
How does this work? I don't get how companies would 1) know what your blog or social network ID is, and 2) how would they have access to it?
Factorials were someone's attempt to make math LOOK exciting.