How do you search for backdoors from the previous IT person?
- by Jason Berg
We all know it happens. A bitter old IT guy leaves a backdoor into the system and network in order to have fun with the new guys and show the company how bad things are without him.
I've never personally experienced this. The most I've experienced is somebody who broke and stole stuff right before leaving. I'm sure this happens, though.
So, when taking over a network that can't quite be trusted, what steps should be taken to ensure everything is safe and secure?