
Figure 3.16 Searching for the Word Trumpet in the BO2K Server File
Once you have the hacker’s e-mail address, you might be able to make him
sweat a little. If the hacker is knowledgeable, he may have used an anonymous e-mail
server. If so, he may be difficult or impossible to trace, but you can contact the ISP,
the upstream provider, and your local federal agent, depending on the severity of the
attack. In either case, you can have the satisfaction of e-mailing him and letting him
know you were too smart for him and he has the possibility of having his account
taken away for abuse of the terms of service.
Firewall Software
One of the main benefits of fire ...