Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: antiRepublicrat

Thanks. 2 other posters on this thread pointed-out that Kernel admitted his actions. I’m sure that the investigators will still follow his tracks in making their case. I was curious how this type of thing gets done.

I’m a little familiar with networks & the differences between static & dynamic addressing. But if anybody else has access to the computer used in this crime it could be tough to make a case. A more sophisticated hacker might have used a “public computer”, like one at an internet cafe.


70 posted on 09/19/2008 1:27:50 PM PDT by Tallguy ("The sh- t's chess, it ain't checkers!" -- Alonzo (Denzel Washington) in "Training Day")
[ Post Reply | Private Reply | To 61 | View Replies ]


To: Tallguy
A more sophisticated hacker might have used a “public computer”, like one at an internet cafe.

The easy thing to do is drive around town with a wireless sniffer (actually, even an iPod Touch will act as one in this case) to find an open wireless network at a place where loitering won't be noticed and there are no cameras. Then either park or sit on a bench nearby and do your business. Preferably don't do this in your own town.

A more sophisticated hacker might use a mix of intentional public proxies (like this one), accidentally left open proxies (a lot of idiots do that), anonmyous proxies (that don't keep logs) and computers he's compromised all over the world. String them all together and go for it.

Anybody who calls this kid a hacker is insulting hackers.

76 posted on 09/19/2008 1:53:52 PM PDT by antiRepublicrat
[ Post Reply | Private Reply | To 70 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson