Quote:
Originally Posted by rlauzon
The thieves gained access. Your network was secure. Therefore they must have had your cooperation. Otherwise how did they gain access?
Having your network secured as recommended by your network provider, using their guidelines, to prevent unauthorized used of my bandwidth, only makes it harder for you to claim that you had nothing to do with it.
|
No sense in continuing this discussion.
Your arguments remind me of my 5 yr old granddaughters......"But Whyyyy?"
Buh Bye!