Quote:
Originally Posted by AdultKing
One word, steganography.
|
Ha! Gotcha, and thanks for that ;)

Potentially a LOT of work.
So we have this ^ and weeding out by IP by combing through logs, in addition to member management software & possibly not letting users choose their own login credentials.
I know there has to be more yeah?
Proactive:
Member management software
Users don't choose logins credentials
and AdultKing's mention
Reactive:
Comb through logs