After Shock Media |
09-07-2008 08:00 PM |
Quote:
Originally Posted by ladida
(Post 14721688)
Doh. I tried to help you narrow it down and tell you how this stuff goes and you're here passing jokes on my account? You mentioned they tried other things aswell as epass. Well, that'll teach me.
It's human error.
|
Wasn't really passing jokes on your account. I need to keep good humor about this regardless.
I have no problems with trying to narrow it down. I have just said time and again of what I place on sites. I pretty much know what is where and what has been used.
Yes they have triggered password requests from sponsors as well. Which could mean perhaps they found one of the many old databases of webmaster information that is sitting in google and have decided to try an old password on as many new sites as possible hoping for a match.
Your whole theory though is based on them having information so that when time comes they can send in documents asking for a password after getting everything reset. Which they were planning on doing but never did for whatever reason.
Michael on the other hand is checking on if protocol was followed, getting a call pulled if it was, and finding out what information was asked and answered if any call was placed as per protocol. Though that still flies in the face of the emails. I am also hoping he will provide me with the headers of the original email, yes I know it more than likely is a proxy but I am real curious about something.
|