01-23-2017, 09:21 AM
Sorry for the bump, but this thread is actually kinda useful.
How do security logs work, especially regarding what happens when you add new entries? How does Beepsky interpret these new logs to determine who to arrest? Can it be used to set monkeys to arrest?
How do security logs work, especially regarding what happens when you add new entries? How does Beepsky interpret these new logs to determine who to arrest? Can it be used to set monkeys to arrest?