Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Duke C.

The logs themselves can be deleted or edited.

If I was assigned the task of cleaning up Hillary’s emails, I would backup the harmless emails and logs, then reformat the server, wiping out every single item on hard disk, then reload the system software and then copy back the emails. The logs can be edited to suit.


25 posted on 03/08/2015 10:58:26 AM PDT by entropy12 (Real function of economists is to make astrologers look respectable.)
[ Post Reply | Private Reply | To 14 | View Replies ]


To: entropy12

And if they find an e-mail or text on someone else’s computer to/from Hillary that doesn’t exist in her log?


30 posted on 03/08/2015 11:03:03 AM PDT by TigersEye (ISIS is the tip of the spear. The spear is Islam.)
[ Post Reply | Private Reply | To 25 | View Replies ]

To: entropy12
"The logs themselves can be deleted or edited. If I was assigned the task of cleaning up Hillary’s emails, I would backup the harmless emails and logs, then reformat the server, wiping out every single item on hard disk, then reload the system software and then copy back the emails. The logs can be edited to suit."

There would be a time-stamp and SUDO user name associated with a re-format.
The system clock would have to be spoofed, and the email header timestamps would have to line up perfectly with the new system time.
Hillary surely doesn't have the IT chops, and would have to recruit an IT pro, who would have to KNOW he was being set up as the fall guy.

I've worked with linux system logs and it gets more and more complicated as you try to falsify stuff.
75 posted on 03/08/2015 1:36:28 PM PDT by Duke C.
[ Post Reply | Private Reply | To 25 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson