And if the owner isn't nice enough, he'll find himself on the host in question's blacklist right quick. Seems pretty fair to me.
James At 09:03 AM 9/23/2006, you wrote: >Hi Robin, >If we are dealing with a smart attacker he used a proxy server. Even >with one that means he can not totally mask and coverup his trail. It >just makes things more difficult. >Phil's host can locate the proxy address in their logs, and trace it >hopefully back to the proxy servers owner. From there if the owner is >nice enough the owner/owners will review there logs to find out who had >access to the server at the time, and narrow down the list of attackers. > >Robin Kipp wrote: > > Hi Thomas and all, > > It's right when you say it is possible to find out who the attacker was > > by viewing the logfiles, but what if he used a proxy? > > Robin. > > > > >_______________________________________________ >Gamers mailing list .. [email protected] >To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit >http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make >any subscription changes via the web. _______________________________________________ Gamers mailing list .. [email protected] To unsubscribe send E-mail to [EMAIL PROTECTED] You can visit http://audyssey.org/mailman/listinfo/gamers_audyssey.org to make any subscription changes via the web.
