Systems administrator David Riebrandt's first hint that intruders had hacked the military network came from telltale electronic footprints. From the logs--electronic records of the information passed on the network--it quickly became evident that a server with gate-keeping control over different parts . . .
Systems administrator David Riebrandt's first hint that intruders had hacked the military network came from telltale electronic footprints. From the logs--electronic records of the information passed on the network--it quickly became evident that a server with gate-keeping control over different parts of the system was getting downright chatty with a foreign computer via the Internet.

"I didn't know what the information meant," Riebrandt said. "I just knew that someone was talking to (the server). And it was talking back."

After an afternoon's investigation, Riebrandt and the other administrators overseeing security concluded that the attackers had compromised the network. So they reinstalled the system, using a secure backup they'd prepared.

The link for this article located at ZDNet is no longer available.