So, recently here in my "Den of Iniquity" (AKA my office) I have noticed that there are a select few people that have decided to get smart and tether their windows mobile based phones to their computer in order to bypass my firewall setup. I am all for the freedom of information! I am indeed a pen tester and a Hacker by trade but I have already had to clean one due to a virus. (please keep in mind, My IT Dept does not support these WM phones)
Question:
How would you as a professional, go about this situation?
would you:
A) set a network policy disabling the user from creating new network connections
B) Remote into these individual's machines and disable all the USB ports other than the keyboard and mouse
C) Nothing Bro! Freedom of information! Hack the Planet!
D) Other
Question:
How would you as a professional, go about this situation?
would you:
A) set a network policy disabling the user from creating new network connections
B) Remote into these individual's machines and disable all the USB ports other than the keyboard and mouse
C) Nothing Bro! Freedom of information! Hack the Planet!
D) Other
Comment