footballer26
11-30-2005, 09:41 PM
Please help and read for me:
I used a keylogger to get a password from his computer who I suspected of having sex with my girlfriend, then just used that to log in. No brute force at all. I used this procedure:
*) Got his password from other computer keylogger
2) Logged into his company email through the web (re: Webmail.****xxx.com)
*) Read a couple emails, then logged off
Do companies usually log this? In other words could or do they usually have the ability to say "Hmm it was accessed by this IP the other day"
I think I messed up and didn't mark something as unread and he might know. I'm afriad he might ask IT dept about it and get definitive proof to back up his accusations. He's kinda a jerk so I'm concerned.
Thanks for reading
Thank you for your patience
I used a keylogger to get a password from his computer who I suspected of having sex with my girlfriend, then just used that to log in. No brute force at all. I used this procedure:
*) Got his password from other computer keylogger
2) Logged into his company email through the web (re: Webmail.****xxx.com)
*) Read a couple emails, then logged off
Do companies usually log this? In other words could or do they usually have the ability to say "Hmm it was accessed by this IP the other day"
I think I messed up and didn't mark something as unread and he might know. I'm afriad he might ask IT dept about it and get definitive proof to back up his accusations. He's kinda a jerk so I'm concerned.
Thanks for reading
Thank you for your patience