Just think of this,
Considering you have a method of successfully bypassing and editing packets...
You then proceed with the actual hacking. What do you think will happen next if LU catches you? you think they're so half-assed to at least not track you back even if you're using IP proxies? Well, pretty much common sense. They have ITEs there too.
Packet editing is possible. Nearly-impossible possible. Its a SERVER you're dealing with and you're only using a client/remote.
Just think of this,
Considering you have a method of successfully bypassing and editing packets...
You then proceed with the actual hacking. What do you think will happen next if LU catches you? you think they're so half-assed to at least not track you back even if you're using IP proxies? Well, pretty much common sense. They have ITEs there too.
Packet editing is possible. Nearly-impossible possible. Its a SERVER you're dealing with and you're only using a client/remote.
|