Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: jsanders2001
Something tells me all it took to figure that out was examining the IP addresses listed in the system logs

The IP addresses alone are no longer an indication of the source.

Multiple proxy servers are used to chain a connection. The endpoint could be anywhere.

28 posted on 06/22/2016 7:08:02 AM PDT by justlurking
[ Post Reply | Private Reply | To 23 | View Replies ]


To: justlurking

I know proxies are used but hackers evenyptually make mistakes. You just create a table of them and look for the anomalies. Usually you will find them after looking for a bit. Serving the foreign companies that host the proxies sometimes works but often not.


31 posted on 06/22/2016 7:15:48 AM PDT by jsanders2001
[ Post Reply | Private Reply | To 28 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson