Platinum
New Member
Ok, well... this may be a touchy subject here, and let me start by saying I am not asking this for bad intentions, if there is a problem posting answers on a thread just say so and that'll be fine. Perhaps maybe a PM to help me out, anyway... here's the issue.
The company I work for (I'm sitting at my desk now) has a independent sales rep, whom we supplied with a laptop. There is suspicion that he is using the laptop for different reasons and we need to access his e-mail. What is the best way of accessing this without him knowing what we are doing?
Like I said, I know this is a touchy subject here, but I must again say, this is not being used for bad intentions, it is our laptop he is using, and quite frankly we have a right to see anything he has, but he can't know.
Edit: We're going to call her and make up some mumbo-jumbo techno jargon and tell her we need to install critical updates, or change some settings to increase her security, blablabla. But anybody have any other suggestions?
Edit: A 2nd option - create a data sending trojan, mask it as something she might need. when she downloads and runs it, it will automatically get the information and send it to me. She obviously won't know what's happening, and shell call to say what I sent her didn't work.
The company I work for (I'm sitting at my desk now) has a independent sales rep, whom we supplied with a laptop. There is suspicion that he is using the laptop for different reasons and we need to access his e-mail. What is the best way of accessing this without him knowing what we are doing?
Like I said, I know this is a touchy subject here, but I must again say, this is not being used for bad intentions, it is our laptop he is using, and quite frankly we have a right to see anything he has, but he can't know.
Edit: We're going to call her and make up some mumbo-jumbo techno jargon and tell her we need to install critical updates, or change some settings to increase her security, blablabla. But anybody have any other suggestions?
Edit: A 2nd option - create a data sending trojan, mask it as something she might need. when she downloads and runs it, it will automatically get the information and send it to me. She obviously won't know what's happening, and shell call to say what I sent her didn't work.
Last edited: