Star 0

Abstract

When you are attacked, odds are the attacker is hiding his location and identity. If you knew he was hiding you might have kept him out. Learn the technologies attackers use to become anonymous on-line, and how their weaknesses may allow you to track them anyway. Finally, learn how to use these tools to better keep track of their activities and try to get ahead of the curve.