General discussion
Thread display: Collapse - |
All Comments
Start or search
Create a new discussion
If you're asking for technical help, please be sure to include all your system info, including operating system, model number, and any other specifics related to the problem. Also please exercise your best judgment when posting in the forums--revealing personal information such as your e-mail address, telephone number, and address is not recommended.
Stolen Laptop Issues
The system is older, and has no security put in place ..etc it was never apart of a domain ..etc In addition there were no login requirements.
I have a good idea of which employee had this machine during this period now comes the time to proove my suspictions. When going through this machine what can I use to verify that this person had the machine.
There were some documents created/modified which appear to belong to the suspect however how can this be made to stick if anyone could change date ..etc :) other ideas? tips?
Thanks!