Back to the main page

Mailing List Logs for ShadowRN

From: DisnyShamn <DisnyShamn@***.COM>
Subject: Re: Weird Campaigns
Date: Thu, 21 May 1998 19:26:35 EDT
From Sommers:

> The other thing that this software can track is where the data is coming
> from. For us, its the IP number of the system that they're logging into.
> For SR, the decker has to get in from SOMEWHERE, whether its the phone in
> his apartment, a terminal inside the archology, or a soda machine in the
> basement. That entry point has to have an address (an IP for us) that
> corresponds to where the data is coming in. You can track that data in the
> security program, seeing that in 20 seconds 10 different users put in the
> wrong password. And its hard to fake that IP number (for lack of a better
> term) because then the computer wouldn't know where the data is coming
> from. Likely result is loss of data and crash of program.

But isn't that what trace IC is for?

- Disney Shaman

Disclaimer

These messages were posted a long time ago on a mailing list far, far away. The copyright to their contents probably lies with the original authors of the individual messages, but since they were published in an electronic forum that anyone could subscribe to, and the logs were available to subscribers and most likely non-subscribers as well, it's felt that re-publishing them here is a kind of public service.