10 May
2011
10 May
'11
10:38 a.m.
http://www.wired.com/images_blogs/threatlevel/2011/05/expendibleipaddresses....
The dates in the timestamps are back in February. We deleted those logs "..in the regular course of business.." a LONG TIME AGO. If you didn't do that, you really ought to ask yourself why. Regards, Michael Holstein Information Security Administrator Cleveland State University