My first thought would be to grab one of the huge hosts files and see if they loopback on DNS requests. Would be cool to redirect to a page that looks as if you are logging these attempts to use the Internet in such way they could be visited by H.R.
Its pretty easy to write a batch file to drop the hosts files down to the clients, make them read only attribule for all users, and lock them to read only rights for the users. If you lock down the attribute its just one more obstacle for a virus/trojan to rewrite it. By locking down the rights your local end users cannot tamper with it either. Otherwise nothing stops them from replacing it when they surf and swapping it back to yours when they are done.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.