Khai opened this issue on Aug 14, 2008 ยท 23 posts
FrankT posted Sat, 16 August 2008 at 1:26 PM
Quote - personally I think the only secure computer is switched off, dismantled and then buried in a peat bog.
After being encased in lead and concrete