of
proof should be enough to have the company behind this.
ciao
.times enemy
-Original Message-
To: [EMAIL PROTECTED]
Subject: How to obtain a yahoo username off a computer
Hello! We have a security issue and need to know who is using a
particular Yahoo user ID from within our company
luck.
ciao
.times enemy
Except that this person will be 'asked to leave' once we are sure they
sent the offended emails to our business partner. So we need to be
as close to 100% as possible. Even though this is employment at will
- but we don't want to get the wrong person!
And yes, most
the various lists, and this article update stuff is
just expounding this, imho.
but yeah, i understand, it's your list, and you'll do what you want with it.
ciao
.times enemy
Howdy Folks,
The following article is now available for viewing on the SecurityFocus
Web site:
Virus Hoaxes and the Real
cache's decryption passphrase
for a specific time frame. There may also be an option which cache's the
signing passphrase for a specific time frame also.
I do not recommend such actions though.
.times enemy
- Original Message -
From: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Sent: Sunday