Assuming that your system is secured as well as can be, and that your
question is not about how to fend off attacks but rather how to stop your
attackers from being able to continue, isn't this the kind of thing that the
police or other law enforcement agencies would normally investigate?

Sam

Reply via email to