Can anyone "give away the Ending" of Cliff Stoll's book - and describe the basic methodology used to track back to the German hacker? I don't have time to read the book. I don't need to understand all the little nuanced details, I just want to know the "trick". Yours in couch potato'dom, {your humble servant}