Hi -

I thought I'd ask here as it seems I'm not really going to get anywhere through 
the abuse desk.  It involves a stolen laptop (company's) and certain dns 
requests that this certain stolen laptop would be making.

-Justin

Reply via email to