Dumb question probably

Out of context: Reply #14

  • Started
  • Last post
  • 15 Responses
  • vburo0

    great article rasko!

    --
    "During a couple of sessions where he was able to gain access to the computer when the iMac's new user was online, Bridges deleted sensitive information off the remote iMac's hard drive, took a picture of the hard disk's new name (which he suspected might be the same as the person using it) and then swapped out the Internet access software's access numbers with his and his sister's home phone numbers.

    Bridges and his sister then received more than a dozen calls each, presumably from the computer itself used during subsequent Internet connection dialups -- the phone number presented on their call ID systems was then used by police investigators to track down the location where the iMac had been most recently used."
    -------

    hahaha, smart fella!!

View thread