Comment

Washington Times Loon: US Should Kill Assange

119
Kragar12/05/2010 12:54:17 pm PST

re: #107 Aceofwhat?

yeah, but you can log access and downloads in the old IBM databases, too. i’m no programmer but i’ve spent more than a little time mucking around in those old things looking for data.

Logs are a great thing if you 1) know what to look for and 2) have someone actively going thru the logs to do it. Attack threshold is another issue. Some security measure are only set to go off if a certain activity hits so many hits per cycle. If you know what you’re doing and keep below the threshold, you’ll never hit the alarms.