View Single Post
Old 06-30-2012, 08:04 AM  
raymor
Confirmed User
 
Join Date: Oct 2002
Posts: 3,745
So what someone could do is they could make a trojaned copy of Rapid Leech which records the unlawful activity, sending logs to a "file locker" owned by the good guys, then they could use Rapid Leech itself to distribute the trojaned copy on all of the file sharing sites?

Since Rapid Leech is a Windows program, tne logs it sends could include the person's name as set in Windows, their IP, whether or not they are using wireless, etc?

Last edited by raymor; 06-30-2012 at 08:05 AM..
raymor is offline   Share thread on Digg Share thread on Twitter Share thread on Reddit Share thread on Facebook Reply With Quote