Hi Robin,
If we are dealing with a smart attacker he used a proxy server. Even 
with one that means he can not totally mask and coverup his trail. It 
just makes things more difficult.
Phil's host can locate the proxy address in their logs, and trace it 
hopefully back to the proxy servers owner. From there if the owner is 
nice enough the owner/owners will review there logs to  find out who had 
access to the server at the time, and narrow down the list of attackers.

Robin Kipp wrote:
> Hi Thomas and all,
> It's right when you say it is possible to find out who the attacker was
> by viewing the logfiles, but what if he used a proxy?
> Robin.
>   


_______________________________________________
Gamers mailing list .. Gamers@audyssey.org
To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit
http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make
any subscription changes via the web.

Reply via email to