>>What if the hacker had implanted the files? What if another hacker before him had accessed the system in the same way and had implanted the files? What if a trojan or a computer virus had accessed the system and had implanted the evidence?<<
Questions I must remember to ask the Victorian police if they decide to waste an enormous amount of taxpayers money prosecuting me for making alleged *death threats*. I am waiting for my case to come up & I am waiting for a rebirth of wonder & I am waiting for someone to really discover America Lawrence Ferlinghetti,
