Catch up on stories from the past week (and beyond) at the Slashdot story archive


Forgot your password?

Comment Re:Countless Comments on Prior Articles & Now (Score 1) 219

Seems like there would be logs upon logs of suspicious activity (or patterns) from both the time spent connected learning the system / figuring out whats what, and time spent leaching off 100TB, right? If that is how it happened as we're told. I also doubt Korea, but there has got to be a shit-ton of traffic logs that point somewhere.

To communicate is the beginning of understanding. -- AT&T