Kiki says "[she] was able to access the keystroke order of the root file to find out who was logged on" to the computer used to send the fake emails.However, on an average computer there is no such thing as a 'root file' (only a root folder or user); keystroke logging is not standard and is usually done using an installed program (or by malware or a virus); and logins would generally be recorded in the system event viewer (although this usually has to be enabled first).
Scritto da il
05/03/2025 alle ore 08:20