Kiki says "[she] was able to access the keystroke order of the root file to find out who was logged on" to the computer used to send the fake emails.However, on an average computer there is no such thing as a 'root file' (only a root folder or user); keystroke logging is not standard and is usually done using an installed program (or by malware or a virus); and logins would generally be recorded in the system event viewer (although this usually has to be enabled first).
Scritto da il 05/03/2025 alle ore 08:20

Consiglia

Voto

Nessun dato in archivio

Commenti

Nessun dato in archivio

Persone

Nessun dato in archivio

SerieTv

Nessun dato in archivio