Quote:
Originally Posted by Matt 26z
Something kind of disturbing about this case is that the only link they needed to get the guilty verdict was her IP address. The original hard drive wasn't even presented.
Unprotected or comprimised wireless internet routers or trojaned computers are a real possibility. If I had been on that jury I would have needed evidence that she was the one actually doing it. Not just evidence that it involved her IP.
|
Yeah, that bothered me as well. I haven't read too deeply about the case, but I would want to see something more. If I remember correctly doesn't Kazza (sp?) continue to run after the user closes it out? I never used it personally, but from what I've heard alot of file sharing programs are like spyware. I know I've walked people through their task manager to stop the processes and their add / remove programs to get rid of it.
