1. Create network accounts for themselves and their friends.
2. Access accounts and applications they wouldn’t normally use for their daily
jobs.
3. E-mail former and prospective employers.
4. Conduct furtive instant-messaging chats.
5. Visit Web sites that cater to disgruntled employees, such as f’dcompany.com.
6. Perform large downloads and file copying.
7. Access the network during off hours.