SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Strategies & Market Trends : Conversion Solutions Holdings Corp. - A Scam? -- Ignore unavailable to you. Want to Upgrade?


To: Jeffrey S. Mitchell who wrote (443)8/17/2006 3:17:31 PM
From: EL KABONG!!!  Respond to of 4624
 
So what do you think about the allegedly hacked email from txprincess7 to Harris?

Hacking another person's computer is a very difficult thing to do. It requires special knowledge, special tools (software) and access to the hacked computer. Access is virtually impossible over dial-up, so we must presume that the allegedly hacked computer had some sort of high speed direct connection to the Internet, and that the person who owned the allegedly hacked computer somehow didn't notice any extracurricular activity on her computer. Hacking is not impossible, but it is extremely uncommon and therefore unlikely. It would be far more likely that someone gained access to her computer when she wasn't around to see it, but I doubt that ever happened.

Presuming that the author of the e-mail didn't forward any copies to any other individual(s), then the only other possibilities remaining are that the recipient either shared the suspect e-mail with others or posted the e-mail himself or didn't secure his computer so that someone was able to just access the receiving computer without the recipient's knowledge. Posting the e-mail would leave "fingerprints", and smart people don't leave fingerprints, so the most likely scenario is that the original e-mail was shared with others or obtained by someone without the recipient's knowledge. Subsequently, one of them posted it to the blog. Why this was done is anyone's guess. I see no advantage to anyone in having done this, so I presume it was done merely to aggravate the sender or perhaps demonstrate some level of control or access of information to other people posting about the company.

EK!!!