By Thewatcher - 22/10/2014 08:09 - Mauritius
Same thing different taste
Infected
By Anonymous - 05/09/2016 16:23 - United States - Albany
By hardlyworking - 04/03/2011 00:39 - United States
By Anonymous - 08/11/2010 17:11 - United States
Cheapskate
By spyrogers1677 - 17/12/2022 06:00 - Canada - Ottawa
Hurry up!
By lukey101 - 29/12/2023 00:00 - Australia - Brisbane
By TingBarter - 09/07/2009 15:00 - United States
Check this out
By Robert - 01/07/2009 09:37 - United States
By disconnected - 23/09/2014 20:19 - Brazil - Santa Maria
By WPA2 OR DEATH - 07/12/2012 21:49 - Australia - Queanbeyan
By bbcgj - 04/07/2015 09:30 - Sweden - Uppsala
Top comments
Comments
OOOHH NOOOO!
Ahh I see your office uses TDS Internet.
your avatar fits your comment perfectly.
If #16's comment said anything along the lines of "those filthy hobbitss" or "My precious", then yes his avatar would go well with his comment.
It's really not that hard to look at logs to determine who is doing what...
Where are the logs? This FML makes it sound like there is no real IT department at OPs job or OP isnt one of the IT and probably shouldnt be installing said software. Im guessing OP has a SO/HO router that doesnt do logging or accounting so the only option would be to go from computer to computer and look at all the installed software.
Ran out of time to edit. I know you can look at the history on the web browser, but many browsers these days have "incognito mode" and if they dont, you cant at least clear your history.
Logs are in the router and every single terminal had them . A lot of IT software just collects and graphs this data in a more readable format. I say this with a grain of salt because depending on the if you're using software or hardware firewalls there is tons more data so on and so forth without getting in to access control policies . Really it's not extremely difficult.... Edit : don't know a modern router especially at a business that doesn't log... If it's that small of a business there probably isn't more then 20 computers ....
Even my home router (Linksys WRT310N) logs traffic. When I have an issue I check which local machine has the most entries, what external address they are accessing and then change the router settings to block that specific traffic. Anyone working in an IT department should have no problem doing something like that. Can even print out the log as evidence.
Is it sad that I d on't understand what any of that is...
Yes.
Get the mikrotik router. I was having problem with bandwith, but after using mikrotik i can control where all my connection will be going.
"Why you think the 'Net was born? ****, ****, pooooorn!"
its simple.just check the router connections and check the most active time logs...
its called use a bandwidth boot, I'm in 9th and know his to handle it
Obviously you don't. Or you suffer from some seriously bad spelling problems
have everyone step away from their computers. Then do a quick inspection.
Keywords
At least when you do manage to download it you'll be able to find out who's doing it!
Once it downloads you'll find the culprit and now at least you know there will be many opportunities to find proof against them.