How do hackers really achieve "anonimity"?
- by Somebody still uses you MS-DOS
I asked if , and would like to know how hackers do it when they try to attack government websites and such. They hack pcs making them zombies and them controlling them, using their victim's ip for example? They connect to it using a VPN, what?
(I'm just curious)