There has been some nasty e-mails going aroung in our office with the names of the boses on the "from" box. One of the boses called me and he seemed to suspect that i was the one responsible. The problem is I don't know how to those things, you know changing names, etc.. My questions are:
How did they come to the conclusion that I was responsible?
Is there a way to connect me to those e-mails if all they can detect is my ip address and adapter number?
How did they come to the conclusion that I was responsible?
Is there a way to connect me to those e-mails if all they can detect is my ip address and adapter number?