the guy logged me into his user account
It's pretty common to have this as the only barrier. If someone got into my work PC they could easily take down a lot of critical infrastructure, if they knew where to look.
Terrible, but common.
It's pretty common to have this as the only barrier. If someone got into my work PC they could easily take down a lot of critical infrastructure, if they knew where to look.
Terrible, but common.