To: Domandred
If this really was her e-mail account that was hacked, you can easily reverse trace this back to the IP address of the hacker. Even if they used a proxy or multiple proxies, the IP’s can be traced back through each step to the source ISP. I do it all the time to track Al-Qaeda sites. On the net it may not be known who you are, but it is easy to find out where you are. A competent tech could know who this is in a day or two.
69 posted on
09/17/2008 11:53:11 AM PDT by
skully
(Sarah Palin eats babies!!!!)
To: skully
If this really was her e-mail account that was hacked, you can easily reverse trace this back to the IP address of the hacker. It's a lot harder than you think.
Do a web search on "Tor anonymous proxy"
112 posted on
09/17/2008 12:31:15 PM PDT by
Knitebane
(Happily Microsoft free since 1999.)
To: skully
Some proxy servers don’t forward the originating IP in the user agent info, or keep log files. How do you trace those?
204 posted on
09/17/2008 3:02:25 PM PDT by
HAL9000
("No one made you run for president, girl."- Bill Clinton)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson