On Thu, 2002-12-12 at 11:42, Shekhar wrote:
> I agree these logs r reqd when u use proxy in Enterprise or similar.
> But in given scenario i.e. in a cybercafe it's not really reqd.
>
> Correct me if I m wrong
You are wrong.
Imagine these situations -
# You run an open proxy and someone spams / launches a DoS through it
# Someone gets a 15 rs per hour account at your cafe and then sends a
bomb threat
or whatever.
What do you do without logs?
srs
-------------------------------------------------------
This sf.net email is sponsored by:
With Great Power, Comes Great Responsibility
Learn to use your power at OSDN's High Performance Computing Channel
http://hpc.devchannel.org/
_______________________________________________
linux-india-help mailing list
[EMAIL PROTECTED]
https://lists.sourceforge.net/lists/listinfo/linux-india-help