Quote:
Originally Posted by madwi
That would be found in about 10 seconds. They'd know exactly where it came from and whose credentials launched it. time stamped the whole 9 yards.
|
What if you had a 40 sec '80 style montage of you hacking into the servers using someone else's info?
Sent from my SM-G965U using Tapatalk