ϲ

Skip to main content
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • ϲ Impact
  • |
  • The Peel
Sections
  • All News
  • Arts & Culture
  • Business & Economy
  • Campus & Community
  • Health & Society
  • Media, Law & Policy
  • STEM
  • Veterans
  • University Statements
  • ϲ Impact
  • |
  • The Peel
  • Home
  • About
  • Faculty Experts
  • For The Media
  • ’Cuse Conversations Podcast
  • Topics
    • Alumni
    • Events
    • Faculty
    • Students
    • All Topics
  • Contact
  • Submit

Professor Explains How to Track a Computer Hacker

Wednesday, June 17, 2015, By Ellen Mbuqe
Share

“A typical footprint is the IP address of the computer. If you hack into a computer, there will be a record that shows what device actually connected with this computer. But an amateur hacker is easily caught, especially if they don’t remove the footprint,” says Professor of Cybersecurity Wenliang “Kevin” Du of the .

Wenliang "Kevin" Du

Wenliang “Kevin” Du

Professor Du is available for media inquiries regarding the hacking of the Houston Astros’ database. Reports indicate that it wasn’t very difficult to link the St. Louis Cardinals due to the footprint left by the hacker.

“The FBI has all the resources to track an IP address and can require an Internet service provider to release information about the person on the other end. Tracing the IP address back to the original computer is quite easy, but the question is whether the hacker is using their computer or hacking into someone else’s computer and using that device for the actual crime. That needs to be brought to court and additional evidence will still need to convince the judge. Professional hackers often comprise a computer belonging to others or those in another country. They also use public Wi-Fi or dial-in from public phone booth. These make tracking back to the hacker much more difficult. For example, if a computer in another country is used, the FBI then needs to obtain access to the computers used in the hacking, and that often requires international cooperation with law agencies in those countries, which can sometimes be difficult to obtain. ”

is a cybersecurity researcher educator and has taught a course on hacking at ϲ. He can be reached at wedu@syr.edu or 315-443-9180. 

Du has developed more than 30 open source labs for educators to teach cybersecurity topics. Some of these labs include teaching students how to hack in order to learn how to prevent attacks. More than 250 educators in 26 countries have used the labs in their classes.

  • Author

Ellen Mbuqe

  • Recent
  • Auxiliary Services Announces Next Steps in Office Refreshment, Vending Transitions
    Thursday, August 14, 2025, By Jennifer DeMarchi
  • Whitman School Names Julie Niederhoff as Chair of Marketing Department
    Wednesday, August 13, 2025, By Caroline K. Reff
  • ϲ Stage Announces Auditions for 2025-26 Theatre for the Very Young Production ‘Tiny Martians, Big Emotions’
    Wednesday, August 13, 2025, By Joanna Penalva
  • 5 Things to Know About New Student Convocation Speaker Andrea-Rose Oates ’26
    Wednesday, August 13, 2025, By John Boccacino
  • Art Museum Launches Fall 2025 Season With Dynamic, Interdisciplinary Exhibitions
    Tuesday, August 12, 2025, By Taylor Westerlund

Subscribe to SU Today

If you need help with your subscription, contact sunews@syr.edu.

Connect With Us

© 2025 ϲ. All Rights Reserved.