It was back in 1999, our webdev team alone had internet access and proxy password was confidentially kept within their team.
We(desktop application development team) built a small application, sent it over on email through testing team, when they opened it, it prompted for the proxy authentication, looking exactly like the proxy window, after accepting password, it would write it the shared network...we waited for 5 hrs first day after mails went to the entire group, finally someone entered it and we got it!
This was very successful after every password change, We didn't tell them how we kept getting credentials, kept blaming that we have contacts...:)
For further actions, you may consider blocking this person and/or reporting abuse
We're a place where coders share, stay up-to-date and grow their careers.
It was back in 1999, our webdev team alone had internet access and proxy password was confidentially kept within their team.
We(desktop application development team) built a small application, sent it over on email through testing team, when they opened it, it prompted for the proxy authentication, looking exactly like the proxy window, after accepting password, it would write it the shared network...we waited for 5 hrs first day after mails went to the entire group, finally someone entered it and we got it!
This was very successful after every password change, We didn't tell them how we kept getting credentials, kept blaming that we have contacts...:)