From: | DisnyShamn <DisnyShamn@***.COM> |
---|---|
Subject: | Re: Weird Campaigns |
Date: | Thu, 21 May 1998 19:26:35 EDT |
> The other thing that this software can track is where the data is coming
> from. For us, its the IP number of the system that they're logging into.
> For SR, the decker has to get in from SOMEWHERE, whether its the phone in
> his apartment, a terminal inside the archology, or a soda machine in the
> basement. That entry point has to have an address (an IP for us) that
> corresponds to where the data is coming in. You can track that data in the
> security program, seeing that in 20 seconds 10 different users put in the
> wrong password. And its hard to fake that IP number (for lack of a better
> term) because then the computer wouldn't know where the data is coming
> from. Likely result is loss of data and crash of program.
But isn't that what trace IC is for?
- Disney Shaman