......and your ignorance is disturbing, If you are using an online server proxy, they delete your log files as per a legal agreement when you sign up
with the companies. There are real "hackers" out there that offer online services in pursuit of their "everyone owns the internet" theory and they
make sure your tracks are covered for you. It costs you a monthly payment but it gets done. They delete (automatically) the log files and DHCP
timestamps and they do a DOD security wipe to ensure there is no recovery. There are private VPN services that are even faster considering bandwidth
using strong encryption methods such as SSL/TLS and do the same as the previous. Don't try to exalt yourself over someone here who actually knows how
the internet works. You will become now the foolish one. I know a couple of these guys and I have seen them at work. Go learn something
edit on 10-2-2011 by Phenomium because: (no reason given)
#1> When you have to PAY for it, you leave traces behind... as much as you think those are secure you MIGHT want to... paypals/credit card is never
good... and when you know s*** about hacking you learn not to trust just anybody's stuff... when the next 10-25 years of your life depends on a dude
saying he's the "3l33t3 h4x04 sh1zn1t..." if you can't to it yourself... you don't do it at all... plain and simple...
#2> Before you REACH the proxy you go through in average 20 nodes... WHICH anyone can hack into and sniff anything that can go through... OR
government can request the info with a subpoena... What good is your proxy server here???
#3> Proxy server can be miss-configured even by the best admin errors happen all the time... as SQUID proxy can leak IP's if x-forwarding is added to
squid.conf... TOR proxy is knows to leak... WEB server can be forced to leak IP's... OR you can exploit the browser being used itself to push forward
4>DHCP timestamp... do you actually even have a clue of what DHCP is or you just googled stuff quickly to try to sound intelligent??? DHCP as in
"Dynamic Host Configuration Protocol" is a daemon running that provide DHCP lease containing IP/DNS/GW.... that allows you to be lazy and not have to
configure it manually on a WAN/LAN network which has anything to do with what you think it does...
5> when you connect to a proxy all it does is port forward you in the direction you chose to your never allocated an IP... a simple version of a 2 way
proxy that would point at a straight host would be done on a linux box with this command [socat TCP-LISTEN:sumport, fork TCP: sumaddress.com:sumport]
which would wait on a port and forward you to the address and port you've pre-defined... at NO point your being assigned an IP the only reason why
they see this IP at the destination node is because they see the IP of where the data come from which is the node your going through... no DHCP here
6> SSL has been cracked... [www.worldnewschannel.info...
] lets assume your only speaking of WEB
proxies here... another thing is you can craft packets/inject code in the data stream to exploits the browser your using and force it to reply
information you wouldn't want it to... or force it to reverse connect back to you without going through the proxy which would give away your IP right
7> you can even force network discovery beyond firewalls by simple UDP datagram/TTL packet manipulation/injection... to force errors on the network
and the host past the firewalls will start spiting errors your way revealing data/IP address that otherwise should of been not accessable...
8>DOD wipe right??? LOL... you MUST be talking about tools that says "DOD Standard drive wiper"... which just write/overwrite/erase and start over
again thousands of times hoping to circumvent any forensic attack from recovering the data... well SORRY dude... Class 3 forensic attack such as
magnetic force microscopy WILL get it back NO MATTER what... you can DOD wipe it until it starts smoking... it can be put back together its just a
matter of money... MFM forensic is very expensive... But the funds are always allocated when you tick off the wrong people...
and finaly... I didn't try to exalt myself above anybody I've been in cyber-security business for the last 12 years, I'm currently working for one of
Canada's major ISP, I administrate linux servers and I was going to start my own small security firm around here but I was offered something for the
government in Can pertaining to cyber security/digital forensic they are creating a team of talented individuals in anticipation of an certain
"upcoming bill" that they seem to believe will pass... anyways I can't really talk about it I signed a NDF and I'm waiting to know if I passed the TS
clearance so I better shut up in the meantime I'm cleared to talk more about it... All I wanted to do was to let you know that you were foolish to
believe a proxy would magically make you 100% safe... cuz they don't... never did... never will they only slow things down and make it a bit harder...
but they definitely don't protect you as well as you think they do...
But if you don't believe me be by guess... like Barney in "How I Met Your Mother" would say.... "Proxy up!"
ps: "real hackers" won't make you pay for it... they give it away for free because we/they are motivated by the intellectual challenge... Linus
Torvalds is a "real" hacker... he created Linux the best operating system out there and gave it to the world...
edit on 10-2-2011 by _R4t_
because: (no reason given)