Quote:
Originally Posted by likwid
They need evidence to prove it though, not just logs of the occurance from the IP, but proof on the HD of the machines also.
They can raid you, and you can blame it on linksys because they don't come secured. 
|
Yes, but a lot of people will leave everything right on a users machine and access it from there if there is enough room using alternate data streams. I've heard of quite a few cases involving illegal porn and bootleg movies that are being kept right on a hacked users machine using alternate data streams without theirnowledge. In a case like that it is pretty hard to prove it was not you if the hackers trail was covered correctly.