Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

Hello Wutai

Your question can hardly be answered without a look at the full trace file.

If you seek help in a potential hacking attack we need a lot more information. Some of the first questions are:

  • Why do you assume, that have been hacked?
  • Would your trace file show a suspected attack or malicious activity after the break in?
  • Detailed information about the software and patch level of your computers can show vulnerabilities.

Please be aware, that a trace file can include sensitive information like passwords or e-mails transmitted in plain text.

In case of a confirmed network intrusion you might want to hire some professional help.

Good luck!