Quote:
Originally Posted by lawdude
But no, the chances that (1) the hole card reading computer contains relevant evidence regarding the hack and (2) it was successfully scrubbed of all incriminating information by a Stones employee with access to it are very close to zero.
Umm, just like I shouldn't dabble in law just because I watch Matlock, you shouldn't dabble in computers because you watch CSI.
Really, wiping and restoring a single-purpose computer like this is so trivial it's not even funny.
Export configuration. Wipe drive. Reinstall windows and drivers from OEM DVD. Reinstall application. Reconfigure and re-apply exported configuration.
FBI: "Hey, why is the install on this machine fresh?"
JFK: "We thought we might have had a backdoor or a trojan, so we wiped it and re-installed everything."
FBI: "You might have destroyed evidence! What were you thinking?"
JFK: "Oh, sorry, we though we had a virus. On a critical machine like this it is SOP to re-install."
FBI: "Grrrrr."