Can anyone "give away the Ending" of Cliff Stoll's book - and describe
the basic methodology used to track back to the German hacker?
I don't have time to read the book. I don't need to understand all the
little nuanced details, I just want to know the "trick".
Yours in couch potato'dom,
{your humble servant}