When it comes to the vast majority of activity by Internet users, it's amazingly easy to trace fake email addresses and anonymous blogs back to their owners. Or, put another way, if the director of the CIA's undercover ops can be cracked, so can yours.
Here's how.
No comments:
Post a Comment