On Mon, 29 October 2001, "R. A. Hettinga" wrote:
[...]
> The key-logger, hidden inside a computer, secretly records everything a
> suspect
> types on it. The device lets authorities capture passwords to unscramble data
> files in otherwise-unbreakable codes.
So what happens if the application g
--- begin forwarded text
Status: U
From: "Virginia" <[EMAIL PROTECTED]>
Subject: IP: Fw: [FiB FORUM] Anti-Terror Tools Include High-Tech
Date: Mon, 29 Oct 2001 17:02:31 -0800
Sender: [EMAIL PROTECTED]
Reply-To: "Virginia" <[EMAIL PROTECTED]>
> &quo