From braintree!news.sprintlink.net!newsfeed.internetmci.com!chi-news.cic.net!simtel!zombie.ncsc.mil!paladin.american.edu!punchdown.zocalo.com!usenet Tue Oct 17 09:25:10 1995
From: firstname.lastname@example.org (Paul Campbell)
Subject: So is here a hacker in the house?
Date: 15 Oct 1995 23:02:45 GMT
Organization: Taniwha Systems Design
References: <9510081155.0GR2300@support.com> <45a6nk$olp@Starbase.NeoSoft.COM>
Content-Type: text/plain; charset=US-ASCII
X-Posted-From: InterNews email@example.com
X-Authenticated: paul on POP host fred.taniwha.com
In article <45a6nk$olp@Starbase.NeoSoft.COM>
wbarwell@Starbase.NeoSoft.COM (William Barwell) writes:
> So is here a hacker in the house?
> Looking for fame and fortune?
> We need a way around this.
Well the simple way is to use an ISP that assigns IP addresses on
the fly as you log in - that way they know which ISP, but not
which customer (the ISP's accounting logs though might be able
to be used to figure this out).
A even simpler way is not to register yourself with DNS that way
just your IP address gets logged - but it's pretty easy (whois)
to figure out your domain anyway and if it's foo.com and there's
only one regular on ars from foo.com .....
Many companies have proxy servers - these are part of their firewall
it makes everyone from within the company end up being logged as the
same machine (for example everyone from sgi who hits my web site
comes in as sgigate.sgi.com.
The obvious solution is a public anonymous proxy server that
makes every acces that goes through it look like it's coming
from the same place - as someone mentioned before it looks like
there are people working on this ...... it will be a bandwidth pig
on whoever hosts it - when they bring them up you should go easy
on them and only use them when you really need to.
Paul Campbell - Taniwha Systems Design - Oakland CA USA
$cientology - the 'religion' for the '50s, where brainwashing is
a sacrament - if you think your newsgroup has wackos check out
alt.religion.scientology! (SP2 and bar)