We found a number of hacking software that had been loaded onto the computer. He had used that to gain access to the administrative computer.