Follow Slashdot blog updates by subscribing to our blog RSS feed


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 internet speed test! ×

Comment How about the reverse problem? (Score 4, Interesting) 367

The IT staff at my former employer saved copies of all email that went through the server... indefinitely. No, they didn't tell employees they were doing it. And yes, they had a search engine so they could do across the board searches of whatever terms seemed interesting at the time.

I find it interesting that different companies are going to different extremes. Some are limiting their exposure by trying to delete all mail and others are saving all mail in order to be able to comply with court orders (or perhaps just get a bit big brother-ish.

For a REALLY strange twist, the company I'm speaking of forced employees to maintain mailboxes under 100MB... while the server admins never deleted a single email that hit the server.


Submission + - how easy is it to plant something on a comuter?

whereisjustice writes: "I'm trying to track down info on planting contraband on someone else's computer. My son has been convicted of possessing child porn because his vicious ex-wife planted it there (or at least that's what we assume since she bragged that she had an FBI boyfriend who was doing it for her). It seems when you're charged with such a heinous crime, you're presumed guilty until proven innocent, and good luck doing that. The deck is stacked against you unless you're wealthy or have some political power. The FBI and US prosecutors hold all the cards and are very good at intimidating people into making up whatever is necessary to promote their case. The poor defendant is stuck with a public defender who really could care less. If you're not interested in pleading guilty, you're screwed. It seems to be the 21st century equivalent of the Salem Witch Trails. Anyhow, we've heard from various computer geeks of how easy it is to invade a computer and plant contraband without leaving any traces of Trojans, but no one seems to know any specifics. My son had an old Windows 98 system with no firewalls or virus protection (it slowed gaming play and became corrupted easily). Everyone has told him he was a sitting duck, but we need to know more — what programs are used, what traces do they leave, how can you prove it, etc. During his trial, the jury was so computer-illiterate, the prosecution merely had to tell them the stuff was on the computer, therefore my son had to put it there. He was fairly computer savvy, so he must have known they were there. We had computer experts who told that the files were hidden and could not be easily found by anyone, no programs on the computer had ever accessed those files, in fact, it didn't appear he even had any software capable of downloading the files (especially at the rates they were downloaded). There were some weird dates on the files (they were altered before being created). Several people heard his ex-wife threaten to put child porn on his computer (and brag about it later), bunches of the files were downloaded during times when the computer was being used to play Everquest, and lots were downloaded while he was at work, but no argument seemed to matter to the jury. The whole justice system seems to have failed in this case, mainly because the FBI swears there is no way anyone could plant stuff on your computer without you knowing it. Does anyone have any info on how this can be done? My son is looking at life in jail for something he did not do!"

Slashdot Top Deals

"Probably the best operating system in the world is the [operating system] made for the PDP-11 by Bell Laboratories." - Ted Nelson, October 1977