Quote:
Originally Posted by u-Bob
One of the examples they used was of an IP address that the IP harvesters claimed was used by a computer that downloaded something but was in reality being used by a network printer.
|
I'm sure it was by the time they came knocking on the door.