I was wondering if anyone would care to share any anecdotes, stories, procedures they went through in following though with a security intrusion - with ISP logs, involving the authorities, etc.
TIA -- ME2 ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~
