Hacker News new | past | comments | ask | show | jobs | submit login

Step 4-7 shows the difference between a person who want to block something (ISP blacklists, national firewalls, ectra) vs actually identifying whom is running a server. The questions of end point, a proxy, VPN or Tor Exit should be the minimal standard for IT related investigations. It saves both innocent bystanders and resources, and is also effective in catching the intended suspect.



Guidelines | FAQ | Support | API | Security | Lists | Bookmarklet | Legal | Apply to YC | Contact

Search: