Quote
Originally posted by Ringwraith:
**Just a thought, but next time USE THE SEARCH FEATURE! Sorry, I had to get that out of my system as this topic has been brought up several times before. Sigh...
**
Another good idea is to route your connection through phone lines, (eg. "Kevin Stonelake's voice phone system") and public access servers, (eg. "Uplink Public Access Server,") who don't log your actions, as a first line of defence. So, in order to do that, they should be the last thing(s) you click on before your final destination, (the server into which you wish to hack.) It's a great trick, especially when hacking into places that don't trace you actively. Since they don't trace you actively (if yu use a monitor bypass,) they can only log the IP adress of your first line of defence, and when they attempt a passive trace, there will be no access logs to continue tracing back to you.