Newbie Q: log deleting

When starting out, do I need to worry about deleting myself in all the Uplink logs and Internic? (Eg the Uplink Bank, Uplink Public Server, Uplink Test Machine, etc etc)?

------------------

You only need to delete logs when you have done something illegal. Then, you only need to delete the logs at one spot (usually InterNIC).

Zerak

------------------
"We live, we die. Get over it."
"If by being abnormal we are normal, and by being normal we are abnormal, we create a paradox loop and therefore we neither exist nor not exist. We simply are."
- Zerak Toman

Thanks. So does this mean I don't have to waste time deleting any logs at servers where I'm copying/stealing/deleting files? I can just do that quickly, disconnect, then reconnect to InterNIC and delete?

------------------

That's correct.

Zerak

------------------
"We live, we die. Get over it."
"If by being abnormal we are normal, and by being normal we are abnormal, we create a paradox loop and therefore we neither exist nor not exist. We simply are."
- Zerak Toman

Yes, as long as you always bounce through InterNIC.

------------------
The box said Windows 95 or greater...so why doesn't it work on a Mac?
Member of WORRPBOITAMPSH, whatever that is

Here's a good question: Should I delete as many logs as possible on the internic server, or should I look for specific ones?

------------------
Who here plays RPG's? 50 replies
So I stole some girl's shirt the other day... 43 replies
Welcome to Banter and Brawl

delete bounce logs and Password Accepted logs. Nothing else.

------------------

I usually make InterNIC the last point in the chain before the target, or put non-Uplink facilities between InterNIC and the target. Deleting the log in question then breaks the chain.

I gather there must be a method for establishing a 'secret' account on compromised systems, either through the console or the records, but I haven't figured that out yet (hints welcome).

So the only question is, how long do you have before the log becomes evidence against you? I've hacked away with tracers chasing my tail up to the last second, but then simply gone in and deleted the InterNIC log (I hadn't been doing the password-accepted ones, just the bounces).

Nick

------------------
"As long as men are free to ask what they must, free to say what they think, free to think what they will, freedom can never be lost, and science can never regress."
-- J. Robert Oppenheimer, American physicist (1904-1967)
(url="http://"http://www.501st.com")The 501st Stormtrooper Legion, 'Vader's Fist'(/url)

All this information is great, I am just a little confused as to whether it is best to go to InterNIC as the first bounce or the last bounce. Currently I bounce through all the Uplink machines, then InterNIC -> target computer.

I disconnect, and then reconnect to InterNIC through the various Uplink computers.

I am then doing as advised here, and deleting all logs except the Connected and Disconnected ones from InterNIC.

However: I have read that you never get traced by InterNIC, and the password always stays the same. (Incidentally it is the only password I have to type every time, clicking on it doesn't seem to copy it in). Does this mean I could just connect straight to InterNIC for the log deletion part, and not worry about bouncing through the Uplink machines first?

So, which would be better:

1. ME -> InterNIC -> Uplink Test/Bank/ISS -> TARGET
2. ME -> Uplink Test/Bank/ISS -> InterNIC -> TARGET

------------------

Going with 1 is the better way. InterNIC dose not trace you, so you can connect to it directly when deleting your logs. Also, if it is your last bounce, sometimes they will have passively traced past it before you delete your logs and you will get caught. (url="http://"http://www.ambrosiasw.com/cgi-bin/vftp/dl-redirect.pl/InterNARC.sit.hqx?path=uplink/addons&file;=InterNARC.sit.hqx")this(/url) will solve the problem you have with InterNIC's password

------------------
I'm going to kill you with a blunt spoon.