Protokoll einer Anstiftung zu einer kriminellen Handlung
So wirbt die Web-Mafia Hacker an
Wie funktioniert der Bankenschutz?
[16:28:11] Deutschland : how is the banking protected? PIN/TAN or with token etc? do you know how they do onlinebanking?
[16:28:28] Indien : not exactly.
[16:28:50] Deutschland : and how will be the "trojan" installed on the senders computer?
[16:29:55] Indien : you can install that in the intranet of ICICI.
[16:30:13] Deutschland : do you have access there or do I need to do that?
[16:30:22] Indien : I dont have access there.
[16:30:27] Indien : I have the id of the sender.
[16:30:43] Deutschland : do you have access to the senders computer?
[16:30:45] Indien : and the id of the recipient.
[16:30:50] Indien : well no.
[16:30:54] Indien : but I have to check.
[16:31:03] Indien : the concerned person will come to me tomorrow.
[16:31:16] Deutschland : is he involved?
[16:31:30] Indien : yes I am involved.
[16:31:34] Indien : no.
[16:31:38] Indien : the person is involved.
[16:31:41] Indien : he has the details.
[16:32:03] Deutschland : well it could be that the bank say "he transfered it" and its his own fault then.