Well done mate! You screwed me over quite good with that one... and leaving a single crumb for me to follow into a dead end was a stroke of brilliance (ok so I exaggerate!
). Still taught me something thanks for that ;)
no idea on the hacker but gratz on the recovery
Which leaves me with some questions for anyone around kind enough to answer:
1) Why is it when I bounce and check the logs sometimes there are 3 logs to delete and sometimes 2? Seems like every now and then I check the logs to delete my trail (just making a habit of it, my Log Deleter software is still the suck) and i see the last entry is the admin login, the next two show my bounce path, while on others it's just the admin login and only one bounce path.. whats that about?
there are 6 types of admin logs
type 1 : recover missions logs - starts hidden - will be undeleted - saying your access codes are XXXXXXXXXXXXX.
type 2 : admin logged in from XXX.XXX.XXX.XXX - this is created when a user has direct connected and started a upload/download.
type 3 : admin logged in from XXX.XXX.XXX.XXX - this is created ONLY when a user looks at the remote logs. (provided one hasn't already been created by type 2)
type 4 : Proxy connection from [FROM] to [HERE] established. - created when someone bounces INTO a server
type 5 : Proxy connection from [HERE] to [NEXT] established. - created when someone bounces OUT of a server
type 6 : anything the user decides to write using log deletion software
as a bonus info - type 4 and type 5 have static timestamps - meaning they get the same timestamp of the original starting bounce connection - all other timestamps are current ones
2) Regarding my gateway (and yes I did search thru the forums looking for answers). I have multiple machines, but only one is my gateway, if someone was to get the IP of my non-gateway machines can they still connect to them without them being my 'current' gateway?
all servers can be hacked regardless of whether they are gateways or not.
3) What happens if I delete a log, then modify it. When a Log UnDeleter is run does it recover it back to the blank log or does it go back to the original? Is this considered a 'hack' of the game by doing this? Still trying to understand the mechanics of a few things!
all undelete log actions will show what was created by the system - not what was created by a human.
4) Any groups looking for an up and coming hacker recruit?
Doc
ask again when you run out of questions :P