> http://www.wired.com/images_blogs/threatlevel/2011/05/expendibleipaddresses.pdf >
The dates in the timestamps are back in February. We deleted those logs "..in the regular course of business.." a LONG TIME AGO. If you didn't do that, you really ought to ask yourself why. Regards, Michael Holstein Information Security Administrator Cleveland State University