On Sat, Jul 17, 2004 at 01:26:43PM -0700, Craig White wrote: > > - a good hacker would use another system to attack other systems to hide > the originating ip address. > > - a good hacker would never make a feeble attempt such as the one you > descibed > > - a good hacker would more than likely gain access and remove the log > entries to cover his tracks. The 2 boxes that I have had hacked were > done well and not easy to spot. > s/hack/crack/g Hackers don't do this kind of thing (except to themselves), crackers do.