Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode.
Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript).
I always delete my logs if I have enough time, but where is it best to start? On the top of the list or on the bottom? Do I need to delete all my logs, or will the logs on the top/bottom do?
Thanks HomeWear
------------------
"To play ev nova or not to play ev nova, that is the question" - Shakespear
At the very least, you should delete the logs that pertain to your last hack (which would generally be routings to other servers, or records of deleting files). InterNIC is a very good server to delete logs from since they will not trace you when you log in as admin.
------------------ Eytee farpoint@mac.com
If you want to break a passive trace, you only need to delete the logs on one computer in the chain. InterNIC is a good one, as Eytee said, but deleting logs can take some time, so try to get User or Admin status on as many computers as possible. A good way to do that is find every bank you can and create new accounts. (I can usualy find about 6 or 7)
------------------ "En gris rumpa ar flask, rok den orh det blir skinka." (A pig butt is meat, smoke it and it becomes ham.) ~ Sweedish Translation
A useful hint - don't delete the last "Connection established from " since every time you disconnect it leaves a "Connection closed from_" log. You only have to delete the logs relating to any nefarious activities you have been engaging in, eg. "Password authenticication accepted from______" "______: Accessed file server", etc.
And delete logs at InterNIC. A very good idea. Always bounce through InterNIC first to prevet any other computers having your IP address.
I think I've played this game too much.......
------------------ "Please do not shoot the thermonuclear warhead"
Quote
Originally posted by DJRowley: Always bounce through InterNIC first to prevet any other computers having your IP address.
Even though your IP is always 127.0.0.1
(For non-techies, that's like identifiying yourself as "me" to everyone, i.e. "What's your name?" "Me.")
------------------ In the beginning, all was NULL, or perhaps (void*). -- (url="http://"http://vegastrike.sourceforge.net/")Vega Strike(/url) introduction One, Two, Three, (url="http://"http://source.bungie.org/")Pfh(/url)(url="http://"http://resurrection.bungie.org/")or(/url) (url="http://"http://www.idevgames.com/")iDevGames(/url)... do (url="http://"http://www.idevgames.com/content/contest.php?id=6")uDevGames(/url)?
All you have to remove are the relay commands "Connection from xxx.xxx.xxx.xxx relayed to xxx.xxx.xxx.xxx" As long as the last one of those that appears in the logs is deleted, they can't trace it any farther.
-J
------------------ Being a Mac user is like being a Navy Seal: a small, elite group of people with access to the most sophisticated technology in the world, who everyone calls on to get the really tough jobs done quickly and efficiently. ------------------ (url="http://"http://www.outwar.com/page.php?x=529719")Click Here(/url) Please use the (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/search.cgi?action=intro&default;=26")Search Feature(/url) before posting
I always wondered about the fact that if you delete a log, then go back into it again afterwards it says "xxx.xx.xx.xxx closed connection". Can they trace this?
------------------ Maybe I am crazy. Or maybe I'm just... interrupted. "You know you've really made it when you get a guest role in the Simpsons"
Originally posted by Jamin!: I always wondered about the fact that if you delete a log, then go back into it again afterwards it says "xxx.xx.xx.xxx closed connection". Can they trace this?
I think that depends on what type of system you hacked into. Very few of them will be persistent enough to detect this sort of flaw, but you may run into some that can.
It's generally best to only delete the bounce log(s) from the first node in your route. I also like to delete the Admin authorization record, but that's probably not necessary. Doing this leaves the log in a state where you can't tell that it's been fiddled with (assuming you have a level 4 Log Deleter).
------------------ ĀĀĀ Got a question? Use the (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/search.cgi?action=intro&default;=26")search(/url) feature before you post a new topic. ĀĀĀ My EV Nova Links: (url="http://"http://www.ev-nova.net/walkthrough/")EVN Walkthrough(/url) | (url="http://"http://www.ev-nova.net/faq")EVN Gameplay FAQ(/url) | (url="http://"http://home.attbi.com/~slagblah/evn_fixes.html")EVN Quick Fix Page(/url) (url="http://"http://home.attbi.com/~slagblah/pilotlog.html")How to make a pilotlog file(/url) | (url="http://"http://home.attbi.com/~slagblah/pilotlog_howtoread.html")How to read a pilotlog file(/url)
No, they will not trace the disconnection log, they just assume you connected to browse the server list, although leaving the connection log makes this look a little better.
------------------ (url="http://"http://uplink.stewsburntmonkey.com")The Uplink Directory(/url)
Is there any order of which servers I connect to first/last that is most efficient? In the tutorial I remember it giving me specific ones, though I don't think it should really matter...
------------------ Going to war without France is like going deer hunting without your accordian. "You're dumb." -Rawzer to whitedevil and whitedevil2
There is no real order, cept that Uplink Test machine or Internic should always be first to delete logs, and your target is always last. It does help, however, to have admin access to the systems that you bounce through.
------------------ Trust is a weakness. Have Faith , the Revelation is coming.
Can't you delete logs from the servers you are on? I have always done this from ones such as the Acedemic Database and such
I like to go InterNIC to Uplink Test Server, because the test server will never revoke your admin. I then do "easter egg servers", such as the game servers, OCP, Introversion, etc. Then I do other useless servers such as the Government's internal services machine, Uplink Public Access, etc. After that, I do file servers, and any other ones that I don't need to hack ever. Save that, then work from there through banks, LANs, Internal Services, Mainframes, whatever, until I get to the machine I'm going to hack for the mission, or just for fun.
------------------ Moderator- (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=9&SUBMIT;=Go&mrxak;=cool")EV Developer's Corner(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=69SUBMIT=Go&mrxak;=cool")Uplink Web Board(/url) | (url="http://"http://forums.evula.com/viewforum.php?f=18")mrxak's Assorted Webspace Forum(/url) | (url="http://"http://forums.evula.com/viewforum.php?f=48")Starcraft Forum(/url) | | (url="http://"http://directory.perfectparadox.com/profile.php?id=00008")My Profile(/url) (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/search.cgi?action=intro")Search First(/url) | (url="http://"http://www.AmbrosiaSW.com/webboard/Forum9/HTML/003091.html")Need Testers?(/url) | (url="http://"http://www.AmbrosiaSW.com/webboard/Forum9/HTML/003196.html")Need Developers?(/url) | (url="http://"http://www.evula.com/survival_guide/")EV/O/N Survival Guide(/url) | (url="http://"http://www.AmbrosiaSW.com/games/evn/addons.html")Nova Addons(/url) | (url="http://"http://www.resexcellence.com/support_files/resedit.shtml")ResEdit(/url) | (url="http://"http://w00tware.ev-nova.net/")NovaTools(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=31&SUBMIT;=Go")Bomb's Plug-in Guide(/url) (url="http://"http://www.evula.org/mrxak/")mrxak's Assorted Webspace(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/vftp/dl-redirect.pl/TheChallenge102.sea.bin?path=evn/plugins&file;=TheChallenge102.sea.bin")The Challenge v1.0.2(/url) | (url="http://"http://www.evula.org/mrxak/Haikus/haikuarchive.html")The Haiku Archive(/url) | (url="http://"http://www.evula.org/mrxak/EV/N/mbspt/mbspt.html")mrxak's Big Secret Plug-in/Tutorial(/url) | (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/postdisplay.cgi?forum=Forum10&topic;=007599-2&whichpost;=mrxak11-06-200203:22PM")mrxak?(/url) "The more you ask a pot if it's boiling yet, the longer it will take to boil." -mrxak
Originally posted by SlaVitiCkus: **Can't you delete logs from the servers you are on? I have always done this from ones such as the Acedemic Database and such
**
Yes, but this doesn't always save you from a passive trace. It can be nice sometimes for slightly different news stories, or hiding what accounts you hacked, but it isn't really neccessary.
This does not stop passive traces if there is an active trace running, since that means they have already gotten past your target machine. Of course, its still good measure to delete the logs...
Eh , I'll worry about the major traces when I get the full version (which will be the very day it comes out)
The full version offers a few extra security precautions as well for some gateways on sale.
------------------ Moderator- (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=9&SUBMIT;=Go&mrxak;=cool")EV Developer's Corner(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=69SUBMIT=Go&mrxak;=cool")Uplink Web Board(/url) | (url="http://"http://forums.evula.com/viewforum.php?f=18")mrxak's Assorted Webspace Forum(/url) | (url="http://"http://forums.evula.com/viewforum.php?f=48")Starcraft Forum(/url) | | (url="http://"http://directory.perfectparadox.com/profile.php?id=00008")My Profile(/url) | (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/postdisplay.cgi?forum=Forum10&topic;=007599-2&whichpost;=mrxak11-06-200203:22PM")mrxak(/url) (url="http://"http://www.evula.org/mrxak/")mrxak's Assorted Webspace(/url) | (url="http://"http://www.evula.org/mrxak/Haikus/haikuarchive.html")The Haiku Archive(/url) | (url="http://"http://www.evula.org/mrxak/EV/N/mbspt/mbspt.html")mrxak's Big Secret Plug-in/Tutorial(/url) | (url="http://"http://www.evula.org/mrxak/EV/N/amtc/amtc.html")A mrxak TC(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/vftp/dl-redirect.pl/TheChallenge102.sea.bin?path=evn/plugins&file;=TheChallenge102.sea.bin")The Challenge v1.0.2(/url) (url="http://"http://www.AmbrosiaSW.com/cgi-bin/ubb/search.cgi?action=intro")Search First(/url) | (url="http://"http://www.modlink.net/guides.php")Uplink Guide(/url) | (url="http://"http://www.evula.com/survival_guide/")EV/O/N Guide(/url) | (url="http://"http://www.ambrosiasw.com/cgi-bin/ubb/forumdisplay.cgi?action=topics&number;=31&SUBMIT;=Go")Plug-in Guide(/url) | (url="http://"http://www.AmbrosiaSW.com/webboard/Forum9/HTML/003091.html")Plug-in Testers(/url) | (url="http://"http://www.AmbrosiaSW.com/webboard/Forum9/HTML/003196.html")Developers(/url) | (url="http://"http://www.AmbrosiaSW.com/games/evn/addons.html")Nova Addons(/url) | (url="http://"http://www.resexcellence.com/support_files/resedit.shtml")ResEdit(/url) | (url="http://"http://w00tware.ev-nova.net/")NovaTools(/url) You have been warned: More haikus are coming!!!
Uhm...this is going to sound really stupid I know, but whats the difference between an active trace and a passive trace?
Originally posted by SlaVitiCkus: **Uhm...this is going to sound really stupid I know, but whats the difference between an active trace and a passive trace?
active trace is the one that your program shows you. After you trigger an alarm, Admins begin to use logs to work backwards. This is passive because you don't see because in RL it would involved Admins calling other admins and asking about their logs.
------------------ 2 Wrongs don't make a right but 3 simple negative words can change your life forever... "No, Don't Stop" (url="http://"http://home.mindspring.com/~rabbit994/pcnova.html")Number of dumbasses(/url)
That's actually why if you bounce through a bank or government server, it takes them longer to passive trace you. Banks and the government don't give out a lot of information unless they're really convinced.