This post is unavailable.
Replying to @fezitsolutions
@mikko Got to agree with @fezitsolutions. Informant is my guess. Covert search of targeted computers is another option.

Feb 2, 2012 · 10:55 AM UTC

1