On Thu, May 29, 2008 at 1:32 PM, Venkat Mangudi <[EMAIL PROTECTED]> wrote: > ashok _ wrote: >> >> If you have a cybercafe with 20 users... and if most of them are using >> something >> like hotmail... how will having my photograph and fingerprint and time >> i used a cybercafe identify who the anonymous sender of a 'threatening >> mail' is... ? > > Even if they were able to track date/time and IP address to narrow it down > (ha ha, the indian forensic investigators have to go a long way to even > dream up that method, just look what's happening in poor Arushi Talwar's > case), the bad guys can always resort to saving as draft in one cybercafe > and sending it from another etc. Or the very handy portable apps will > prevent detection. Oh, just thinking about it gives me a dozen ideas, that > may or may not work. >
Oooh Venkat....I am sending the CID to your place to take your fingerprints in advance, then you can be framed no matter who actually commits the cyber crime (you have proved malicious intent by the above email!) But maybe, like Forsyth or Archer,you are only going to write a book with all the how-to details....and of course you can escape the (police) net by typing with your toes! Deepa.
