On Thu, 2002-12-12 at 11:42, Shekhar wrote:
> I agree these logs r reqd when u use proxy in Enterprise or similar.
> But in given scenario i.e. in a cybercafe it's not really reqd.
> 
> Correct me if I m wrong

You are wrong.

Imagine these situations -

# You run an open proxy and someone spams / launches a DoS through it

# Someone gets a 15 rs per hour account at your cafe and then sends a
bomb threat

or whatever.

What do you do without logs?

        srs




-------------------------------------------------------
This sf.net email is sponsored by:
With Great Power, Comes Great Responsibility 
Learn to use your power at OSDN's High Performance Computing Channel
http://hpc.devchannel.org/
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help

Reply via email to