Thursday, January 19, 2012
Seven staff to monitor weapons, my god!.
<P> The end of the summer just do not go quiet. .Coca-Cola first, the three American companies, "the devil" trying to sell Pepsi to Coca-Cola formula, there are some companies require employees to use company began clear-mail login MSN, said, "This is more conducive to prevent the leakage of business secrets." .</ P> <P> 500 companies in the technology department of a head of Mr. Ma appears, in order to prevent the disclosure of confidential or affect their work, everyone in the company sent letters, even with the MSN chat secretly make a private phone companies are likely to be .monitored, "but the company does not specifically sent to real-time monitoring, but to ensure that the evidence left behind, need to find out everything." </ P> <P> print out your MSN owner records </ P> <P .> Last year, the newspaper broke a female staff member with the boyfriend in private houses on MSN, the result is technology department, "real-time monitoring," found that her words have become private houses all the company's catchphrase ... ... we saw this company .admiration --- pay someone to vote to stare at people all day to chat a bit money too! .</ P> <P> Technology Department to search MSN chat logs, a little rare. .However, unless your boss is difficult for you by name, usually too busy or we die, how can there be space to see colleagues to chat? .The company used to have a "delicate" the boss, think him a very low efficiency of men, according to company procedures to apply to the MSN search his records. .Then he printed a thick pile of the person's "private" chats directly thrown in his desk: "You could see for himself, after you concentrate on work." This man suffered "humiliation," to silence less than a month .resigned leave. .</ P> <P> watch the video task, "the ghost" </ P> <P> one occasion, a notebook kept important information missing in the company. .Boss is very tight, almost to the matter as a "theft of trade secrets within the ghosts." .So, we installed a camera in a few export to send a large handy. .All afternoon, I and a colleague to sit down and look at video. .Our more casual dress code, many of my colleagues to back a bag to work, we analyze the apparent seriousness, who looks more heavy bags or clean garbage bag aunt have installed heavy ... ... finally my colleague, sharp-eyed: "What Well .not the laptop that guy forgot to lock up after work, been received had a really good security! "</ P> <P> each floor, a" bar "</ P> <P> I used to work at another company .their addition to the necessary e-mail exchanges, staff are not allowed access. .Located on each floor of the two old machines as "Internet cafes", we occasionally find information easily. .IP address that the two machines, and it is separate from the internal IP, the purpose is to prevent poisoning. .Provided that the company has been allowed on the outside that network, but once there is a technical staff with a house divided against itself secretly changed his machine IP on the external network, the result of a virus. .Separated for a while, all the paralysis of the corporate network, the most trouble is the local line network together paralyzed factories, and made the boss utterly exhausted. .Kick out the initiator of Technology, he also knows wood wood feel. .Since then, companies have very strict check things online, but can not be considered "one size fits all", it set up "Internet cafes." .Of course, the "Internet cafes" where computers are often out of stock of various departments, to look at the screen and sometimes the old are not clear, as no one enjoying the Internet. .</ P> <P> personal phone calls to their own pay to </ P> <P> personal phone calls at the office, and very easy to hit the muzzle. .If the boss calls that are particularly high this month, will be to us to check - this is not through the bureau, and technical department can handle that. .</ P> <P>, of course, we will not have voice recording, but the time, number, call time, everything on record. .That once found a small boy with long-distance calls to Hong Kong on the yuan, and are playing after work. .To ask his boss, the other saying softly: "He does not Hong Kong customers. Called out of his own money." Until the little boy went to pay a "fine", we did not played against him face to face, but do not know .Why fight long. .</ P> <P> to your computer and lock </ P> <P> Some brands of desktop computers, such as IBM, has a lock on the main chassis, allowing the company to drive locked --- .removed to take away the company secrets do not come to light it? .So, now specializes in the procurement of a number of safe-type lock, really to the company for each desktop and laptop are on the lock. .Stolen laptop may carry out, and we also bought a special encryption software, if not enter the password to open the can only see a bunch of gibberish. .Usually a laptop thief, the general will only format the hard disk and then resell to sell. .Afraid to encounter "Gao" thief, found that the computer company's trade secrets are to look for opportunities to sell to our competitors. .If you see all garbled, and he naturally would not take great efforts to declassified. .</ P> <P> "Large Mail enthusiasts list" </ P> <P> mail sent out by e-mail company, we generally pay little attention to content. .We monitor the flow of each machine is limited bandwidth --- the company, if you made a mess of a large number of popular e-mail, it may block an important message of road. .Last time guy, a one-time forwarding of nearly 100 "oversized mail", and made the network the "big traffic jam." .He has not finished his, I ran past a colleague, "who received stolen goods," but only a few education. .</ P> <P> Each month, we will do "large mailing list lovers", and expel the top 10 to the boss. .Boss found a "continuous list," who put him to send a "large email" tune out. .Most of these messages and work-related, fortune, according to the "evidence", we'll write to the person's immediate supervisor, asked him "good discipline." .</ P> <P> U disk was full monitoring software </ P> <P> I have worked for several companies, to monitor e-mail, MSN, will be stated beforehand, but also suffer from "character" poor .to not meet the boss. .I've worked for a company, a department of trouble in bursts disturbed students. .It is said that the department staff on the day before my colleagues complain about the MSN company, the boss will come to pick on the next day. .Some even accused the boss in the MSN after the fierce, and soon to be fired! .Inventory of privately how they have felt like someone hit a small report. .</ P> <P> so he was secretly to ask me, "Technology will not look at our MSN chats?" I am sure to tell him that the company has not opened this "business", if opened, certainly .will advance the greeting. .In disbelief, that my colleagues go, in fact, I still did not say a word: to monitor the MSN software, online download everywhere. .To monitor large-scale, under the eyes of the technical department must get it working; but if only a few people stare, "shoot" completely not difficult. .</ P> <P> there a company more funny, that private employers fear his life two things: that he was ill and the staff to do private. .Originally, he means to training is also limited to a number of "nosy", but then I do not know where to knock aside, I found a colleague to help him "to do private" colored installed monitoring software to the company, "it that I can see .MSN what they said ... ... "my colleagues did not seriously, to the side that did not bring U disk, on the spot by one. .Get out the door and all was to think of it, did not destroy the U disk in the "evidence." .</ P> <P> is a coincidence, that girl lend him U disk, actually in the latter half of the dinner met, said the little girl up and laughed: "Thanks to you do not delete, or we do not know. There .screen when it is not strong to MSN, the boss scolded two stingy, and he really excitedly called to criticize the party meal, proud to death ... ... "</ P>.
Labels:
[:]
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment