And "work" him/her self may read this list...
From: School Information Technology Discussion on behalf of Bill Clark
Sent: Tue 2/19/2008 11:22 AM
To: [log in to unmask]
Subject: Tracking down rogue computer
There is a computer on the network whose name is simply "WORK" , and it does not belong. If folks need to use a non-school laptop or computer, it comes to me first.
It has been there for many days. I see it in the Wins info, and DHCP. Call me a control freak, but I want to catch this person.
Is there a way to block traffic from this one device ? Can I use some kind of sniffer to see what type of traffic is coming from this machine ? Maybe it is a rogue access point ...
Austine School for the Deaf
This email may contain information protected under the Family Educational Rights and Privacy Act (FERPA) or the Health Insurance Portability and Accountability Act (HIPAA). If this email contains confidential and/or privileged health or student information and you are not entitled to access such information under FERPA or HIPAA, federal regulations require that you destroy this email without reviewing it and you may not forward it to anyone.
This message has been scanned for viruses and
dangerous content by MailScanner <http://www.mailscanner.info/> ,ClamAV <http://www.clamav.net/> and Bitdefender <http://www.bitdefender.com/> , and is
believed to be clean.