This would point to your IP address, but wouldn't show in your hard drive as having accessed something you haven't.
malicious persons can dump to the tif on your drive,
windows linux mac, makes no difference
[sup]*2[/sup],
wireless open wpa wep, hardwired, makes no difference
as long as you have any browser open when the attempt is made
the protocols are published,
the bypass tools are also published,
If there are in the tif items relating to this event there is a possibiility that some person of malicious intent went hunting
[sup]*1[/sup] for
andy, very unlikely but possible
If however the items relating to this persecution, are elsewhere than the tif, they got there only 1 way, persecution -no, prosecution -yes, hang the *expletive deleted*
*1: force images into the tif, then inform the authorities of the existence, andy must have really *expletive deleted* somebody off
*2: on a windows pc an executable can be more easily executed from the tif