hello room,
As Said in my introduction iam very much new to networking and computer security fundamentals.My Question might be very silly but pls help me out

My Query is :--
In my organization a log file is created whenever any user browse the net with the IP of his machine .
I want to know how thse log files are created and can anybody mask his IP address and fool these people(networking people) i hope u cant fool the network engineer,and how do you reada particular log file