FBI/NSA hint


image

lets play sleuth (yanqui style), and see how invasive we can be.

ie take logs and “expand them” – on the local machine. See what all the OTHER (non-logged) components would have been seeing when executing the routines being logged. All relatively normal – unless you think about what is “revealed” for purposes other (than fixing your PC)

 

image

Advertisements

About home_pw@msn.com

Computer Programmer who often does network administration with focus on security servers. Very strong in Microsoft Azure cloud!
This entry was posted in spying. Bookmark the permalink.