This could be very effective at compromising the target's work machine, which would allow you to plant evidence in more easily accessible places, making it far easier to drop an anonymous email message to an IT manager, for example.are not you glad I am not the sort of person who would try to frame someone? :-)