Jan Andersen, DK
pre 15 godina
Somewhat interesting. I would like to know what it was used for. Like which files where created or modified on those dates? Was the laptop protected with a password? Any signs in the logs about unsuccessful login attempts?
1 Komentari
Sortiraj po: