Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: HamiltonJay
How did they get onto her computer?

They wouldn't have to. They could use the peer-to-peer download software to determine the IP address of the computer, then backtrack the address to the user's internet service provider, who they would subpoena for the identity of the user with the lease on that IP address at the time in question.

223 posted on 12/27/2005 10:12:18 AM PST by E. Pluribus Unum (Islam Factoid:After forcing young girls to watch his men execute their fathers, Muhammad raped them.)
[ Post Reply | Private Reply | To 222 | View Replies ]


To: E. Pluribus Unum

Yes, if the machine was set up to share files, this is true.


227 posted on 12/27/2005 11:37:58 AM PST by HamiltonJay
[ Post Reply | Private Reply | To 223 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson