Why couldn't you be dealing drugs like normal people?

Snyder ,'Empty Places'


Buffistechnology 3: "Press Some Buttons, See What Happens."

Got a question about technology? Ask it here. Discussion of hardware, software, TiVos, multi-region DVDs, Windows, Macs, LINUX, hand-helds, iPods, anything tech related. Better than any helpdesk!


§ ita § - Feb 26, 2013 4:41:06 pm PST #22116 of 25497
Well not canonically, no, but this is transformative fiction.

Changed between which two points?


Jessica - Feb 26, 2013 4:41:46 pm PST #22117 of 25497
And then Ortus came and said "It's Ortin' time" and they all Orted off into the sunset

Cirdan? Elendil? Feanor?


Cass - Feb 26, 2013 4:44:19 pm PST #22118 of 25497
Bob's learned to live with tragedy, but he knows that this tragedy is one that won't ever leave him or get better.

Email from my stepmom to a company and back and forth detailing what they have not done despite being paid. They are showing something different than her copies. And it would be better if this didn't end up going to court.


Liese S. - Feb 26, 2013 4:49:29 pm PST #22119 of 25497
"Faded like the lilac, he thought."

Oooh, Elendil would work, because I've currently got Minas Ithil and Minas Anor as volumes out there. And then if I get the iPad I can name it Anduril.


le nubian - Feb 26, 2013 4:55:27 pm PST #22120 of 25497
"And to be clear, I am the hell. And the high water."

Cass,

I don't know if anything can be done post-hoc, however, where are your step-mother's email messages? Are they sitting on a server somewhere?


§ ita § - Feb 26, 2013 4:58:56 pm PST #22121 of 25497
Well not canonically, no, but this is transformative fiction.

Yeah, if the horse is out of the barn, the issue would be if there are copies of the message sitting on any third party servers whose contents can be verified as unaltered, I'm guessing.


le nubian - Feb 26, 2013 5:02:39 pm PST #22122 of 25497
"And to be clear, I am the hell. And the high water."

To answer more specifically, if your step-mom's email messages are sitting on a server (gmail, hotmail, etc.), then don't download them, have them stay there.

In gmail, you can click "go to original" and that will show the pathway the email took to get to the recipient. If you want to do this in a formal fashion before court, I would probably bring in a witness to observe me logging into my email account, going to the message(s) in question and printing out the "go to original" and having a notary stamp that person's statement.

If you want to pay a bit to have the above, you can see if there is tech support at your local college or university (or school) and they can observe the same thing, verify that you didn't tamper with the email message and sign a statement. I would send you to Best Buy, but...? The university/school option might come with a fee. You probably would want to bring your own laptop so said witness does not have access to the email longer than necessary.

If this goes to court, you'd need a special consultant to deal with this verification bs, but paying a tech support person might be no more than $50 (or a Farscape boxed set).


le nubian - Feb 26, 2013 5:04:23 pm PST #22123 of 25497
"And to be clear, I am the hell. And the high water."

Oh, if it is a university, they probably could have you log into a university computer that gets wiped with every login. That might be the best option. have you log in with your credentials and call up the email and have the tech print the original options.


le nubian - Feb 26, 2013 5:05:39 pm PST #22124 of 25497
"And to be clear, I am the hell. And the high water."

Also, though you suspect nefarious activity (and it may be that it is)...what if the company is incompetent in cutting and pasting?


Cass - Feb 26, 2013 5:56:35 pm PST #22125 of 25497
Bob's learned to live with tragedy, but he knows that this tragedy is one that won't ever leave him or get better.

the issue would be if there are copies of the message sitting on any third party servers whose contents can be verified as unaltered, I'm guessing.

Good point.

Oh, if it is a university, they probably could have you log into a university computer that gets wiped with every login. That might be the best option. have you log in with your credentials and call up the email and have the tech print the original options.

Oh, possible. Except I don't know how her email is set up.

Also, though you suspect nefarious activity (and it may be that it is)...what if the company is incompetent in cutting and pasting?

I don't really care if it's nefarious or stupid, so long as they admit that their emails were altered. They can use the, "oops, it was a mistake," line. It is absolutely nefarious but probably just in an ass covering way.

I'll pass on the info. I am asking about her system too.