Has anyone given any though to how log files could be accepted as
evidence in the first place? They're just text files, and exceedingly
trivial to alter, forge, erase, whatever. They get edited all the time
by hackers -- how can anyone, even the sysadmin, swear that they are
"true"? We just saw a case of FBI hackers breaking into a computer in
Russia -- why couldn't they break into a server as an ISP and alter the
logs? It would be quite easy for them to do that, even easier if they
had a Carnivore box in house.

--
Harmon Seaver, MLIS
CyberShamanix
Work 920-203-9633   [EMAIL PROTECTED]
Home 920-233-5820 [EMAIL PROTECTED]

Reply via email to