And if the owner isn't nice enough, he'll find himself on the host in 
question's blacklist right quick. Seems pretty fair to me.

James
At 09:03 AM 9/23/2006, you wrote:
>Hi Robin,
>If we are dealing with a smart attacker he used a proxy server. Even
>with one that means he can not totally mask and coverup his trail. It
>just makes things more difficult.
>Phil's host can locate the proxy address in their logs, and trace it
>hopefully back to the proxy servers owner. From there if the owner is
>nice enough the owner/owners will review there logs to  find out who had
>access to the server at the time, and narrow down the list of attackers.
>
>Robin Kipp wrote:
> > Hi Thomas and all,
> > It's right when you say it is possible to find out who the attacker was
> > by viewing the logfiles, but what if he used a proxy?
> > Robin.
> >
>
>
>_______________________________________________
>Gamers mailing list .. [email protected]
>To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit
>http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make
>any subscription changes via the web.


_______________________________________________
Gamers mailing list .. [email protected]
To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit
http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make
any subscription changes via the web.

Reply via email to