Quote:
|
Secondly, email and host password are the same-
|
figured.
Learn Networking and Linux. Then, whois.com her, trace her IP, find her open ports, infiltrate, map her machine/network. Take her out.
jk. Wouldn't be ethical. I'd be impressed if you could do it though
