The Original Tree
Diamond Member
Dear Dufas:Yes, you do NEED TO LOOK AT THE SERVER.I've been saying this for quite a long time. nothing new. no government agency, none, nada have looked at that server. evah!!!!!!!! That's how I know without a doubt and can say factually, Russia did not hack the DNC server. See how fking easy that is?
They also didn't look at the water cooler! The microwave!
You don't need to hand over a server to prove a hack . Especially a hack where they just stole a password .
Why don't you quit lying? You are awful at it.
THE FBI "NEEDED TO LOOK AT CLINTON'S SERVER" to assure us (to save her campaign) that her server was not hacked.
So your assertion that we do not need to look at THE DNC SERVER LOGS to determine if it was hacked......IS A BOLD FACED LIE.
Do you work in IT? or are you one of those people we have to deal with that constantly creates "ID Ten T" errors?
Again, you are full of shit. Assange said Seth Rich gave him The Emails and they were not obtained through Russia, or any Russia Intermediaries.
STOP POSTING STUPID NONSENSE IN BOLDED CAPS.
I work in IT - security logs do not require looking at the server hardware, they are completely portable, just like any piece of data on any server.
You should quit your job in IT as you are no good at it. I am sure your password is probably password come to think of it.
You have to look at THE SERVER, The Server logs, The Event Logs, or The Firewall, or some piece of hardware within the DNC Network to determine if there was an INTRUSION.
Answer me this Mr. IT..... Why did not even "Crowd Strike" look at the actual server? And why were they forced to "retract" the majority of the original report THE DNC paid for them to write?
The Server Logs IS NOT HARDWARE. It is a software component, mr Crazy.
You are a phucking moron. When I say you have to look at some kind of hardware on the network, Switches though they are hardware generate logs, which yes are software based. But since you are losing this argument and badly, you want to split hairs.
Firewalls, though they are hardware generate logs, which can be analyzed to detect and intrusion. A Router, though it is hardware generates logs which can be used to detect an intrusion.
I doubt you work in IT. You are too phucking stupid and too much of an dick to be working in that field.
POST THE LOGS show us THE DNC SERVER, or STFU!