> http://www.wired.com/images_blogs/threatlevel/2011/05/expendibleipaddresses.pdf
>   

The dates in the timestamps are back in February. We deleted those logs
"..in the regular course of business.."
a LONG TIME AGO.

If you didn't do that, you really ought to ask yourself why.

Regards,

Michael Holstein
Information Security Administrator
Cleveland State University

Reply via email to