Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-09 Thread Stilgherrian
Robert, to comment on the first half of your posting at least (the maths of cryptography is still something I haven't explored)... On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote: Last summer my PC was attacked by a malicious hacker who used a Trojan Horse NetBus. My Norton

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-09 Thread Bill Hinton
Yes it is possible to track a hacker but unless you have proof and can trace it to someone in the US it's a moot point. If you want to trace an attacker you should have the following: 1. An active intrusion detection system (IDS) that can perform a trace back to the source regardless of

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Stilgherrian
Robert, to comment on the first half of your posting at least (the maths of cryptography is still something I haven't explored)... On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote: Last summer my PC was attacked by a malicious hacker who used a Trojan Horse NetBus. My Norton

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Ron DuFresne
In the case of NetBus, at some point someone actually had to install the trojan on your computer. This is easier than you might imagine. Is your computer *always* under lock and key when not in use? Do you *never* run software downloaded from anywhere except official sources, and then only

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-07 Thread Muenzinger, Karl
Robert Betts wrote: I learned after he gave me a research paper to read, because there was a computer technician there working on his PC to help him reinstall his backed up files. How do you know this technician isnt the hacker in question? Which underscores the next point Stilgherrian

Re: Is It possible to trace a hacker, and on Diffie-Hellman

2002-01-06 Thread Alvin Oga
hi robert it's not good that your pc was hacked..etc... if you didnt save your log files...before they erased it.. its lots harder to track your 'friends if you didn record the network activity as soon as you unpluged your hacked machine to see where they are coming from and trying to