So what someone could do is they could make a trojaned copy of Rapid Leech which records the unlawful activity, sending logs to a "file locker" owned by the good guys, then they could use Rapid Leech itself to distribute the trojaned copy on all of the file sharing sites?
Since Rapid Leech is a Windows program, tne logs it sends could include the person's name as set in Windows, their IP, whether or not they are using wireless, etc?
|