I need help identifying the source of repeated intrusions on my network. I’m more tech savvy than the average bear and I’m not an alarmist. I also suspect that I know the culprit behind the hacks, but am not enough of a tech expert to fully assess how extensive the breach is or how to verify the source of the hacks. Note: the access ongoing, and although unauthorized, I’m allowing it in order to catch them. I I need assistance in preserving and verifying source to secure evidence for police/courts.
... View more