Robert, to comment on the first half of your posting at least (the maths
of cryptography is still something I haven't explored)...
On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote:
Last summer my PC was attacked by a malicious hacker who used a Trojan
Horse NetBus. My Norton
Yes it is possible to track
a hacker but unless you have proof and can trace it to someone in the US it's a
moot point. If you want to trace an attacker you should have the
following:
1. An active intrusion
detection system (IDS) that can perform a trace back to the source regardless of
Robert, to comment on the first half of your posting at least (the maths
of cryptography is still something I haven't explored)...
On Sun, Jan 06, 2002 at 06:30:16PM -0500, [EMAIL PROTECTED] wrote:
Last summer my PC was attacked by a malicious hacker who used a Trojan
Horse NetBus. My Norton
In the case of NetBus, at some point someone actually had to install
the trojan on your computer. This is easier than you might imagine. Is
your computer *always* under lock and key when not in use? Do you
*never* run software downloaded from anywhere except official sources,
and then only
Robert Betts wrote: I learned after he
gave me a research paper to read, because there was a computer technician there
working on his PC to help him reinstall his backed up files.
How do you know this technician isnt the
hacker in question? Which underscores the next point
Stilgherrian
hi robert
it's not good that your pc was hacked..etc...
if you didnt save your log files...before they erased it.. its lots harder
to track your 'friends
if you didn record the network activity as soon as you unpluged your
hacked machine to see where they are coming from and trying to