View Poll Results: Have you seen Fahrenheit 9/11
- 26. You may not vote on this poll
May 11th, 2004 09:30 AM
Creation Of Log Files
As Said in my introduction iam very much new to networking and computer security fundamentals.My Question might be very silly but pls help me out
My Query is :--
In my organization a log file is created whenever any user browse the net with the IP of his machine .
I want to know how thse log files are created and can anybody mask his IP address and fool these people(networking people) i hope u cant fool the network engineer,and how do you reada particular log file
May 11th, 2004 09:54 AM
Very broad question. The creation of the log file depends on the OS and what is used to create the log file. Some log files are created from the firewall, some created by the OS itself, some by the routers. As for fooling the "networking people", not unless you find every potential trace/location. (which I don't recommend because it could be a reason to find a new job for the person that does try this).
Some logs are done in plain text while others require a special reader. It all depends on what is creating the log.
May 11th, 2004 10:14 AM
I may appear stupid here, but I do not see the relevance of your poll options to your question............have you got two posts mixed up?
If you cannot do someone any good: don't do them any harm....
As long as you did this to one of these, the least of my little ones............you did it unto Me.
What profiteth a man if he gains the entire World at the expense of his immortal soul?
May 11th, 2004 03:19 PM
Let me see if I understand the question correctly. You are presumably on a company network. So, for the sake of argument, suppose their are twenty workstations all networked together, each having their own IP? And lets say that the boxes are assigned 192.168.0.100 to 192.168.0.120..all of a sudden, an IP shows up inside the network 126.xxx.xxx.xxx (for example)? Exactly how long do you think it would take, by process of elimination, to figure out it was you?
Probably a weak example..still on that first cup of coffee
May 11th, 2004 06:10 PM
it also seems to me that if you don't own those computers, or the network that it is attached to then don't do it.... what you are talking about could mean the loss of a job...
also those logs are put into place because employers want ot know if there employees are useing then network like they are supposed to....
however its up to you.... its your job!!!!!!