Quote:
Originally Posted by john_savage1982
[You must be logged in to view images. Log in or Register.]
I don't see how they can stop us from reading the logs and running our own programs that use log data to generate useful information.
|
From a technical standpoint, it would be virtually impossible to stop people from using a log parser approach to mapping. For example, even if the parser process was identifiable, if you ran the parser on another computer (or in a virtual machine) and accessed the log file remotely the process would be effectively hidden from detection.
I'll post a follow-up to my original query in the "Petition / Exploit" forum and see if I can get someone to weigh in officially.