Solved

Can an IP address be cloned by a hacker?

Posted on 2003-10-24
4
264 Views
Last Modified: 2013-12-04
If someone hacked into my computer and then posted something on a forum or any website for that matter, will it log my IP address or theirs?  

The reason I am asking is that someone posted something on my forum recently that was offensive and I logged their IP address and when I confronted them about it they explained that their computer was hacked into.  Is this a plausible explanation or is this person just lying?
0
Comment
Question by:s_montero
4 Comments
 
LVL 18

Accepted Solution

by:
liddler earned 25 total points
ID: 9617906
It depends on what you used to log their IP address, IPs can be spoofed, but it seems unlikely that a hacker would spoof the address of someone you know, who has presumably used your forum.  
How was their machine hacked?  How did they fix it?  Anything is plausible, but lying seems more likely
0
 
LVL 19

Assisted Solution

by:Dexstar
Dexstar earned 25 total points
ID: 9617913
s_montero,

> Is this a plausible explanation or is this person just lying?

It is *POSSIBLE* that someone hacked into their computer and used it to submit form data to the forum website that posted the offensive message.  In that case, the web server would definitely log the IP of the hacked computer.

But remember Occam's Razor:  The simplest explanation is usually the one that is correct.
Which is more simple?
  A) Someone went through all the effort to hack into that one person's computer to post an offensive message on some website
or
  B) That person didn't think you'd be able to figure out it was them.

I don't think their story is very plausible at all.

Hope that helps,
Dex*
0

Featured Post

Simplifying Server Workload Migrations

This use case outlines the migration challenges that organizations face and how the Acronis AnyData Engine supports physical-to-physical (P2P), physical-to-virtual (P2V), virtual to physical (V2P), and cross-virtual (V2V) migration scenarios to address these challenges.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Recently, a new law in my state forced us to get a top-to-bottom analysis of all of our contract client's networks. While we have documentation, it was spotty at best for some - and in any event it needed to be checked against reality. That was m…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

829 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question