I was wondering if anyone would care to share any anecdotes, stories,
procedures they went through in following though with a security
intrusion - with ISP logs, involving the authorities, etc.

TIA

--
ME2

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to