Quote:
Originally Posted by RWebb
the vendor end seems most likely but a scan on his unit is the easiest thing to do
How would he address this to the vendor? If he sends an Email it can be seen...
|
Yes, the vendor end is the most intelligent/lucrative, but if the crook has gotten the user and password for either end or for enough consumer ends, then it's like panning for gold. you go through a lot of silt, but you've only got to find a nugget every once in a while. And if you've got software setup to download emails and scan for keywords...
__________________
Steve
'08 Boxster RS60 Spyder #0099/1960
- never named a car before, but this is Charlotte.
'88 targa

SOLD 2004 - gone but not forgotten