Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

That's OK if you're directly trying to access the machine, but it's not enough if you're looking through logs to try to understand which of your machines is contacting you.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: