You’re an odd one, Natocha… Some of your posts are reasonable, some are of the "We hates EvE, precious! We hates it! grr blarf blarf! variety, and a few are straight-up trolling.
If you think EvE is so bad and not worth people bothering with, why are you helpful to new players?
OP suspected bots, was shown that was not the case, and seems at least ok with that…but why are you trying to divert him out of EvE?
You should have the logs, what you should do is check to see the timing, if you see more than 6 firing within the same second server tick, as in seven or more then he may be botting, five is a good number for even dexterous players with ultra nimble fingers.
I would advise you to check the logs because he is intellectually dishonest in that he has said that there has been no buffs to ganking, and anyone who does that is likely to be dishonest in other ways.
I fail to see the relevance to what the OP experienced, as mentioned, the ganker was using 20+ Omega accounts to destroy the Deep Space Transport that he was flying.
You can use several alphas at the same time. It being forbidden does not invalidate the possibility to do it, just like murder being forbidden by law does not mean it is not possible.
You missed the very relevant part of the post that addressed Virtual Machines. I won’t be as combative as some and explain why it’s relevant.
If someone is using VMs that restriction is bypassed as each VM is emulating an independent OS and hardware. The characters are, for all intents and purposes, running on individual computers that depending on the config may, or may not, be on the same network.
However, the hardware signatures are fairly easy to identify, the choice of emulated chipsets being somewhat limited.
Furthermore the hardware investment required to use VMs to achieve with alphas what the Kusion Special Team does with multiboxed omegas is significant, more so than that required to do it with omegas.
Not really. You can emulate the local hardware, and/or modify the mac address of the hardware.
You can even run a program in a remote computer that is hacked and show the window in your computer.