To: Duke C.
The logs themselves can be deleted or edited.
If I was assigned the task of cleaning up Hillary’s emails, I would backup the harmless emails and logs, then reformat the server, wiping out every single item on hard disk, then reload the system software and then copy back the emails. The logs can be edited to suit.
25 posted on
03/08/2015 10:58:26 AM PDT by
entropy12
(Real function of economists is to make astrologers look respectable.)
To: entropy12
And if they find an e-mail or text on someone else’s computer to/from Hillary that doesn’t exist in her log?
30 posted on
03/08/2015 11:03:03 AM PDT by
TigersEye
(ISIS is the tip of the spear. The spear is Islam.)
To: entropy12
"The logs themselves can be deleted or edited. If I was assigned the task of cleaning up Hillarys emails, I would backup the harmless emails and logs, then reformat the server, wiping out every single item on hard disk, then reload the system software and then copy back the emails. The logs can be edited to suit."
There would be a time-stamp and SUDO user name associated with a re-format.
The system clock would have to be spoofed, and the email header timestamps would have to line up perfectly with the new system time.
Hillary surely doesn't have the IT chops, and would have to recruit an IT pro, who would have to KNOW he was being set up as the fall guy.
I've worked with linux system logs and it gets more and more complicated as you try to falsify stuff.
75 posted on
03/08/2015 1:36:28 PM PDT by
Duke C.
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson