Server Logs – tracing the hackers

so there I was again searching through endless server access and error logs looking for bedroom hackers who leave their IP for me to paste into the server firewall.

Typical activity seems to take the form of searching for known vulnerabilities and then requesting to see if that file does exist on the server for exploitation. It’s not that I dislike that type of routine police task (which incidentally I have worked into my daily schedule) it’s just that I find these guys so dumb, and in need of a clip around the ear. I guess it is better than so other questionable youth activity, but really guys, go take a girl out for a pizza!

About The Author

Chris Hambly

I teach how to leverage the Internet for building a business and generating income. I went from the kitchen table to selling my first online business for half a million dollars, ($500,000). I'd like to show you how you can do this too. Sign up for free lessons, I'll send a video right away.