theeking43
Junior Member
What is the name of your state (only U.S. law)?
OHRoadwarrior, your last sentence is really hard to understand.Once a search warrant or permission breach the router has occurred, it is possible to determine the specific computer engaged in the activity. Even a single action can result in severe criminal prosecution. A lawyer negotiated deal to very beneficial to apprehend a real "player" if it results in a charge not requiring sex offender registration.
That was not the sentence that was hard to decipher.Should have been permission to breach the router and discover the specific computer involved.
Uh-huh. I've worked in IT for well over 15 years now, and I've never heard of 'breach the router'.Should have been permission to breach the router and discover the specific computer involved.
I'll see your breached router and raise you a floppy disc and a hard drive!I think it's code for some pornography thing.
I'm going to call that bet with a tape backup system.I'll see your breached router and raise you a floppy disc and a hard drive!
Lay off the Bloody Mary's, dude.Once a search warrant or permission breach the router has occurred, it is possible to determine the specific computer engaged in the activity. Even a single action can result in severe criminal prosecution. A lawyer negotiated deal to very beneficial to apprehend a real "player" if it results in a charge not requiring sex offender registration.
I'll see your breached router and raise you a floppy disc and a hard drive!
There have been SEVERAL cases filed against computer-owners which have involved copyright-infringing downloads and child pornography downloads tracked to computers, but where the computer-owners were oblivious to the illegal acts committed. They had unsecured wireless routers that were used by others to commit crimes. The downloads can actually be stored on the oblivious computer-owner's computer without the computer-owner's knowledge.While never hearing that term either (although admittedly justalayman) I think he means simply that if permission is given to access the router logs so as to be able to determine what computer received the porn.
Quincy, wasn't there some recent rulings on issues involving unsecured routers. I think it was dealing with downloading movies or something but wouldn't that be a possible means to defend any illegal downloads, at least as long as incriminating evidence isn't discovered on the suspects computer itself?
And to you geeks in general: how do you tell if something was downloaded and deleted or if it was viewed but never downloaded? If a person unintentionally was presented with illegal porn (went to some site where it was presented to them without intending to view illegal porn), isn't there something in archived data linking them to the illegal porn? Hopefully you understand what I am asking.
And what if you don't use a router ORW? Not everybody does?