Hi Robin, If we are dealing with a smart attacker he used a proxy server. Even with one that means he can not totally mask and coverup his trail. It just makes things more difficult. Phil's host can locate the proxy address in their logs, and trace it hopefully back to the proxy servers owner. From there if the owner is nice enough the owner/owners will review there logs to find out who had access to the server at the time, and narrow down the list of attackers.
Robin Kipp wrote: > Hi Thomas and all, > It's right when you say it is possible to find out who the attacker was > by viewing the logfiles, but what if he used a proxy? > Robin. > _______________________________________________ Gamers mailing list .. Gamers@audyssey.org To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make any subscription changes via the web.