- Jan 24, 2017
- 107
- 0
- 0
This is a simple question with perhaps a more complex answer.
I once came upon a guest of our son, his fiancée, in fact, upstairs with her laptop plugged into our iMac, thus our network. She mumbled something about work. Our son wasn’t there.
My question is, did she not simply ask us for the password so as to remain anonymous? Would she have been able to access private data by plugging into the network by a port in the iMac?
Some background. The lady was proven to be very dishonest and the engagement was broken. Later we discovered, as did our other son where she also visited, our credit cards had been hacked and charges made against them.
Just wondering.
I once came upon a guest of our son, his fiancée, in fact, upstairs with her laptop plugged into our iMac, thus our network. She mumbled something about work. Our son wasn’t there.
My question is, did she not simply ask us for the password so as to remain anonymous? Would she have been able to access private data by plugging into the network by a port in the iMac?
Some background. The lady was proven to be very dishonest and the engagement was broken. Later we discovered, as did our other son where she also visited, our credit cards had been hacked and charges made against them.
Just wondering.