View Single Post
Old 07-01-2005, 02:40 PM   #2
S-Journey
Registered User
iTrader: (0)
 
S-Journey's Avatar
 
Join Date: Jun 2003
Location: location
Posts: 626
Quote:
Originally Posted by likwid
They need evidence to prove it though, not just logs of the occurance from the IP, but proof on the HD of the machines also.

They can raid you, and you can blame it on linksys because they don't come secured.
Yes, but a lot of people will leave everything right on a users machine and access it from there if there is enough room using alternate data streams. I've heard of quite a few cases involving illegal porn and bootleg movies that are being kept right on a hacked users machine using alternate data streams without theirnowledge. In a case like that it is pretty hard to prove it was not you if the hackers trail was covered correctly.
S-Journey is offline   Reply With Quote