Tracing a hacker
Sometimes, it's just not enough to simply know that there's a Trojan or Virus onboard. Sometimes you need to know exactly why that file is onboard, how it got there - but most importantly, who put it there.
[snipped]
So now you know how you can detect and track without any special programs.
Hope you enjoy,
Archangel
EDIT: You cannot copy an article from somewhere/someone else in breach of their copyright, and remove any credit for the original source or the author.
http://www.bleepingcomputer.com/tutorials/tutorial99.html
> Tracing a hacker
> Written by: Paperghost [paperghost@vitalsecurity.org]
> http://www.vitalsecurity.org
> Loyalty and Protection for All our Families
> 24/02/2005