|
Authored by: Anonymous on Friday, December 14 2012 @ 11:04 PM EST |
From what I've seen (and I'm not an expert in this field) there are really only
two ways people try to figure out where hacks came from, the first is looking at
the IP address of the sender, the second is digging through the binary(s)
delivered and trying to find any information remaining (ie the path name for the
folder the hack was compiled in). Neither work against sophisticated hackers
though. Tracking with IP addresses is stopped by a simple proxy server, and
incidentally China would apear to be a pretty good choice for the location of
the proxy you chose as it is unlikely it is a US government surveillance proxy
server or the like. The other way is dealt with simply by being extremely
carefull when compiling, and creating the code not to leave any identifying
marks, perhaps even personally going through the binary's to check if you have
the know how.
Also as to the suggestion to banning an entire populace because of a few
hackers, have you ever heard of the concept of collective punishment, and why it
is a bad one?[ Reply to This | Parent | # ]
|
|
|
|
|