[EMAIL PROTECTED] wrote:
> 
> Wouldn't the time of the hack be pretty well known and wouldn't the RPI
> firewall logs be timestamped or am I naive?
> 

most likely that was a failed case of the assumption that the criminal
always returns to the site of the crime.

Reply via email to