Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Fasceto

How stupid. A hacker cleans the logs after he’s in.


2 posted on 03/03/2016 3:06:04 PM PST by dinodino
[ Post Reply | Private Reply | To 1 | View Replies ]


To: dinodino

They also would have used a very small axe! Those digital logs are real small!


14 posted on 03/03/2016 3:13:14 PM PST by foundedonpurpose
[ Post Reply | Private Reply | To 2 | View Replies ]

To: dinodino
How stupid. A hacker cleans the logs after he’s in.

Probably not stupidity, politics at work.

19 posted on 03/03/2016 3:18:01 PM PST by centurion316
[ Post Reply | Private Reply | To 2 | View Replies ]

To: dinodino
A hacker cleans the logs after he’s in.

Like, with a cloth?

22 posted on 03/03/2016 3:22:17 PM PST by Izzy Dunne (Hello, I'm a TAGLINE virus. Please help me spread by copying me into YOUR tag line.)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: dinodino

lol - the logs were probably “0 bytes” long ;) ...just as we knew they would be. It is not evidence, it is like proving a negative. Besides, evidence of hacking doesn’t necessarily show up in “security logs”.


27 posted on 03/03/2016 3:29:08 PM PST by fuzzylogic (welfare state = sharing consequences of poor moral choices among everybody)
[ Post Reply | Private Reply | To 2 | View Replies ]

To: dinodino

Yes, how do you verify that your server has been hacked anyway?

How Do I Know if My Server Has Been Hacked?
08 Jul , 2015

A lot of people think they’d know if they were hacked. It’s not uncommon for people to believe they were hacked simply because their computer seems to be running slowly or something feels out of the ordinary. The truth, though, is that usually when you’re hacked, there’s no obvious sign. Hackers work hard to ensure their victims are unaware what has happened until it’s too late, if ever.

However, if your server gets hacked, you need to find out as soon as possible. With your server compromised, the party responsible could do just about anything.

This is why it’s so vital that your company has a policy in place regarding new programs being installed. It should cover not just which programs can be installed, but how it will be done. One reason for this is that hackers who get through your server’s safeguards will most likely begin installing software on your computers. With installation complete, the hacker can then use that software to cause all kinds of problems.

Along similar lines, users may all of a sudden start receiving requests from strange programs asking for permission to access your network. This is almost always proof that your server has been hacked.

Of course, you may also find that important programs have been uninstalled. Even your company’s own firewall can be uninstalled by a hacker with enough skill. If you ever notice something like this, whether a hacker is behind it or not, you need to take action ASAP.

Although we covered that hackers like to keep their work a secret, sometimes their goals keep this from occurring. For example, sometimes they want to use computers on your network to send spam emails. Obviously, this will eventually get back to you. Unfortunately, because the hacker is using valid email addresses, many recipients may not realize they’re being scammed until it’s too late.

Another sign that should set off alarm bells is a marked increase in network activity. It often means that your firewall has been hacked or otherwise bypassed. After a hacker gets into your network, they may be interested in using your bandwidth for their own purposes. As a result, normal functions that need an Internet connection may slow down significantly.

Any time a hacker strikes, it should be reason for concern. However, if they’re able to get past your server’s security, there’s no telling what kinds of problems they could cause.

http://www.serverpronto.com/spu/2015/07/how-do-i-know-if-my-server-has-been-hacked/


32 posted on 03/03/2016 3:34:12 PM PST by KeyLargo
[ Post Reply | Private Reply | To 2 | View Replies ]

To: dinodino

Considering the thousands of people around the globe spending 24/7 trying to hack into every server, Mrs Clinton must have fire walls better than the CIA. Considering she didnt even encrypt her emails that is impossible. She sure doubles down when the room keeps getting smaller and smaller.


45 posted on 03/03/2016 4:12:22 PM PST by blackdog (There is no such thing as healing, only a balance between destructive and constructive forces.)
[ Post Reply | Private Reply | To 2 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson