So, I was thinking several months ago, reading articles and reports of malicious activity, and we all know that hackers take steps to obscure their identities and locations. I wanted to ask about some of the methods used, In general, I would assume that tor would be an obvious choice, as well as routing traffic through compromised machines. is this a fairly accurate portrayal of modern techniques?
Forum Users Online
In total there are 66 users online :: 1 registered, 4 hidden and 61 guests (based on users active over the past 5 minutes)
Most users ever online was 1535 on Fri Feb 01, 2008 3:38 pm
Legend: Administrators, Global moderators