S Scarecrow New member Dec 11, 2011 #1 If they can use it against me what can I do to protect myself? I believe someone got a copy of it. What does it contain and what do I need to change in my computer so that the information is useless to them?
If they can use it against me what can I do to protect myself? I believe someone got a copy of it. What does it contain and what do I need to change in my computer so that the information is useless to them?