View Single Post
Old 11-19-2008, 07:12 AM   #59
rlauzon
Wizard
rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.rlauzon put the bomp in the bomp-a-bomp-a-bomp.
 
rlauzon's Avatar
 
Posts: 1,018
Karma: 67827
Join Date: Jan 2005
Device: PocketBook Era
Quote:
Originally Posted by desertgrandma View Post
Wrong, oh kemo sabe. I claim I secured my network as recommended by my network provider, using their guidelines, to prevent unauthorized used of my bandwidth.
Now, tell me how in the widest stretch of the imagination you can possibly say I 'conspired' or in anyway helped thieves gain access??
The thieves gained access. Your network was secure. Therefore they must have had your cooperation. Otherwise how did they gain access?

Having your network secured as recommended by your network provider, using their guidelines, to prevent unauthorized used of my bandwidth, only makes it harder for you to claim that you had nothing to do with it.
rlauzon is offline   Reply With Quote